Blogs

Log4J / Log4Shell – GYTPOL ...

Log4Shell . The latest vulnerability is causing a cybersecurity meltdown in the security community. It’s been 12 months to the day since FireEye announced that they were victim of the now ...

Safe Remediation

Managing configurations, patching, and updating system controls is one of the most notably difficult things that any CISO has to deal with.  But it is one of the most critical to manage, as a ...

Automated Fixes

Most often I have found that the issue of addressing the problem is more pressing than simply identifying the threat. We have a massive, multi billion dollar, industry dedicated solely to ...

Lateral Movement is the Key Issue

Black Hat USA 2021 was pretty sparsely attended but to be honest we enjoyed the show! Having finally gotten home it took me a week or so to decompress from all the travel and the meetings but I ...

Misconfigurations – The Real ...

As a definition, a vulnerability is something, anything that an attacker can target and exploit in order to access an application or environment, or possibly a user.  Hackers in most ...

AD Threats

Active Directory Threats Do threats against your infrastructure’s Active Directory security keep you up at night? Honestly, it should. Active Directory is critical as it controls access to ...

Cyber Workout

Cyber Workout I like to work out! I got the bug when I was serving in the armed forces and it has stuck with me ever since.  I enjoy different and difficult types of exercise that ...

Cyber Soap

Cyber Soap As a follow on to our last write up about an effective digital vaccine we thought it would be worth pointing out a few facts about a critical topic in the health arena. Soap. ...

Stopping cyber pandemics with a ...

Stopping cyber pandemics with a digital vaccine Let’s be honest, ransomware is a pandemic. A pandemic of epic proportions. Think about this WannaCry spread at a rate of roughly 140 ...