-
Implementing security policy is not easy. It's difficult from a technical perspective, sure, but convincing others in your company that the changes are necessary can be just as much of a challenge. Doubly so if you can't convince leadership.
The story of Twitter's current security woes is a great example.
Read More -
The Peiter Zatko (aka "Mudge") vs Twitter situation has gotten very public. Mudge released a very long (84 pages) document that details what he says is a longstanding pattern of indifference to security. Here are the technical details of the alleged security failures.
NOTE: mDAU-free analysis. You're welcome.
Read More -
So, after much rending of garments and gnashing of teeth (e.g., complaining), I passed the CISSP.
Let's talk about that.
Read More -
The basic idea behind out-of-band networks is simple: Don't put management interfaces on a public subnet. ZPE's products do this in a very modern way- but they also provide a lot more security and flexibility than a run of the mill KVM solution.
Read More -
The amount of unsecured internet-connected devices that are crawling around our homes (sometimes literally) has been on the rise for years. The latest Amazon Echo hack reminds us that these devices are powerful tools that cannot, and should not, be blindly trusted on our home networks.
Read More