Blog Entries

Can you see the real me – can you?

Usernames and passwords are being stolen by ‘bad actors’ every day.  Via human engineering exploits, the ‘bad actor’ lures legitimate users into unwittingly surrendering their usernames and passwords. One of the more popular exploits is the well-crafted e-mail messages that warns of service interruption for the recipient’s e-mail service – just click the link and […]

Dark Web? We don’t need no stinking Dark Web…

Wait what? Need the Dark Web? What are you talking about? The truth is so much information about you is already available in all the places where it’s supposed to be secure. Imagine for a second that your personal information only existed in the Dark Web.  Ironically, it might really be less accessible – well […]

Apathy: CyberSecurity’s biggest HURDLE

WE ARE COMFORTABLY NUMB, AND THE DATA AGGREGATORS KNOW IT…. Who knew Pink Floyd’s classic rock hit could be the theme song to the current state of data breaches.  Given the lack of any lasting public outrage for data breaches and leaks of personal data, I find myself wondering if the masses really care?  Meaning, […]

The Case of the Mysterious Lockout

A client contacted me recently concerned that someone was locking out user accounts, but the client couldn’t see the source of this activity in their SIEM. Had it been implemented properly? Was there a bug or problem with the system? Maybe the logs weren’t being parsed properly. Inquiring minds want to know! I like a […]

Contact Us Close