Log4J / Log4Shell – GYTPOL ...
Log4Shell . The latest vulnerability is causing a cybersecurity meltdown in the security community. It’s been 12 months to the day since FireEye announced that they were victim of the now ...
Log4Shell . The latest vulnerability is causing a cybersecurity meltdown in the security community. It’s been 12 months to the day since FireEye announced that they were victim of the now ...
Managing configurations, patching, and updating system controls is one of the most notably difficult things that any CISO has to deal with. But it is one of the most critical to manage, as a ...
Most often I have found that the issue of addressing the problem is more pressing than simply identifying the threat. We have a massive, multi billion dollar, industry dedicated solely to ...
Black Hat USA 2021 was pretty sparsely attended but to be honest we enjoyed the show! Having finally gotten home it took me a week or so to decompress from all the travel and the meetings but I ...
As a definition, a vulnerability is something, anything that an attacker can target and exploit in order to access an application or environment, or possibly a user. Hackers in most ...
Active Directory Threats Do threats against your infrastructure’s Active Directory security keep you up at night? Honestly, it should. Active Directory is critical as it controls access to ...
Cyber Workout I like to work out! I got the bug when I was serving in the armed forces and it has stuck with me ever since. I enjoy different and difficult types of exercise that ...
Cyber Soap As a follow on to our last write up about an effective digital vaccine we thought it would be worth pointing out a few facts about a critical topic in the health arena. Soap. ...
Stopping cyber pandemics with a digital vaccine Let’s be honest, ransomware is a pandemic. A pandemic of epic proportions. Think about this WannaCry spread at a rate of roughly 140 ...