Uncategorized

ptx-cloud-security-blog-1920x744_0.jpg

Though the common vernacular is “The Cloud,” the truth is, there are multiple cloud environments and providers available to organizations looking to utilize this growing technology. Read on to learn about the different types of cloud environments, and the biggest security obstacle each presents. Cloud…

Read More

cybersecurity-generic-article-hologram-900x412_0.gif

We all know that to err is human. The problem is some mistakes are an order of magnitude larger than others. If you forget to buy apples at the store, that’s unfortunate. But if you forget to lock down your cloud server with…

Read More

cybersecurity-generic-blog-cloud-lock-1920x744_1.gif

Speed is essential in today’s business climate, hence the rise of DevOps. Unifying development and operations compresses development cycles and enables more frequent deployments that align closely with business objectives. It’s no wonder executives love DevOps. But one question is often left unasked in…

Read More

cryptojacking-banner-1920x744.jpg

It’s hard to escape hearing about cryptocurrency these days. But this new monetary system is not utilized by a large percent of the population, and is incredibly complex, so many of us are left to simply smile and nod when it’s brought up…

Read More

I read somewhere that your security is only as good as the measures you use to test it, which makes sense, and which explains the shift we have seen in the past few years in the security market. Penetration testing, aka ethical hacking,…

Read More

privileged-access.png

Bridge at night with lights shining

The term "privileged access" has become a hot topic as of late. For the first time in history, the Verizon Data Breach Investigations Report actually included privileged access as its own section in the report with some not so surprising results. Couple of…

Read More

Big or small, every organization has accounts that hold ‘keys to the kingdom’ credentials. Almost every account holds some level of privilege that can potentially be compromised, resulting in not only financial, but reputational damage. Looking at top patterns in the 2016 Verizon…

Read More

You think that you're safe, that your network is secure, that your firewalls are protecting you...but how will you know if you don't test it? A penetration test, or pen test, is an attempt to evaluate the security of an IT infrastructure by safely…

Read More

Hi, After Enrique Elias Nissim (@kiqueNissim) and I presented "Getting Physical: Extreme abuse of Intel based Paging Systems" at CanSecWest2016 (slides here), I decided to write a series of blog posts explaining in detail what we presented and show what we couldn't in a…

Read More

The role of the healthcare CISO has expanded exponentially since the HITECH Act of 2009.  CISOs were traditionally charged with the responsibility to maintain the IT environment consisting of applications and infrastructure.  Today they are taking on an expanded organizational role consisting of…

Read More