ICS Security Plagued with Basic, Avoidable Mistakes
A survey of ICS security posture found outdated firewalls, improper segmentation password mistakes and more. Continue reading ICS Security Plagued with Basic, Avoidable Mistakes
Collaborate Disseminate
A survey of ICS security posture found outdated firewalls, improper segmentation password mistakes and more. Continue reading ICS Security Plagued with Basic, Avoidable Mistakes
For the second week of National Cyber Security Awareness Month, we would like to focus on a very important part in having a good website security posture: monitoring.
How can security monitoring save your day?
Most people only care about their w… Continue reading Security Monitoring Saves the Day
Root accounts are the keys to powerful IT systems, the backbone of your entire infrastructure. They use privileged credentials to control shell access, file transfers, or batch jobs that communicate with other computers or apps, often accessed remotely… Continue reading (SSH) Keys to Unix Security
Since 2003, October has been recognized as National Cybersecurity Awareness Month. It is an annual campaign to raise awareness about the importance of cybersecurity and being a better digital citizen.
October has just started and a majority of securit… Continue reading October Cybersecurity Month
Having a website today is way easier than it was 10 or 15 years ago. Tools like content management systems (CMS), website builders, static site generators and alike remove a lot of the friction around building and maintaining sites. But, is there a pr… Continue reading SSL vs. Website Security
This is the last post in our series on E-commerce Security:
Intro to Securing an Online Store – Part 1
Intro to Securing an Online Store – Part 2
Today, let’s expand on some of the suggestions made during a webinar I hosted recentl… Continue reading E-Commerce Security – Planning for Disasters
In the first post of this series, we discussed some of the main website security threats. Knowing the website security environment is a vital part of a good website posture. However, it is also important to be aware of what to do to strengthen your we… Continue reading How to Improve Your Website Security Posture – Part II
For many people and organizations around the world a single password is sometimes the only security control protecting their sensitive information, access to email and even their bank account. The traditional password best practice was to create a long… Continue reading Back to the Basics: The problem with forcing regular password expiry
As attackers constantly innovate new exploitation and evasion techniques, enterprise security teams are having to stay ahead of a host of emerging threats. Often, these threats have been encountered in other enterprises, and shared knowledge of these t… Continue reading 3 Key Mobile Enterprise Threats in 2018
I have been involved in IT and security in one way or another for almost 30 years. I have worked full time for organizations and consulted in a wide variety of jobs and responsibilities. But one of the common issues I have seen and been par… Continue reading Finding Your Weakness: Triaging Your Domains with SWAT