We Don’t Take Vendor Pitches

We Don’t Take Vendor Pitches

This site has been online for more than a couple decades now. I removed all advertising from the site a couple years ago to maintain as impartial of an approach as I can. The post We Don’t Take Vendor Pitches appeared first on Liquidmatrix Security Digest ... Read More
War Stories: Just Shut Off Telnet

War Stories: Just Shut Off Telnet

Years ago I was working on a project that had a rather interesting premise. It was a way to send a file between two parties that was stamped as verified by a third party intermediary. Pretty basic stuff but, in the 90s it was rather neat. One of the things ... Read More
“Here Be Dragons”, Keeping Kids Safe Online

“Here Be Dragons”, Keeping Kids Safe Online

| | Features
Sitting here this morning sipping my coffee, I watched fascinated as my 5-year-old daughter set up a VPN connection on her iPad while munching on her breakfast out of absent-minded necessity. It dawned on me that, while daughter has managed to puzzle out how to route around geofencing issues that ... Read More
When Disaster Comes Calling

When Disaster Comes Calling

| | Features
There are times like this when I can’t help but wonder about disaster recovery plans. A large number of companies that I have worked at or spoken with over the years seemed to pay little more than lip service to this rather significant elephant in the room. This came to ... Read More
Never patch another system again

Never patch another system again

| | Features
Over the years I have been asked a curious question numerous times. ‘If we use product x or solution y we wouldn’t have to patch anymore, right?” At this point in the conversation I would often sit back in my seat and try to look like I was giving their ... Read More
IoT And Your Digital Supply Chain

IoT And Your Digital Supply Chain

| | Features
While there is a mad rush to stake claims across the Internet for things like connected toasters, coffee makers and adult toys it seems security falls by the way side. The post IoT And Your Digital Supply Chain appeared first on Liquidmatrix Security Digest ... Read More
Blackhat, BSidesLV and DEF CON Parties 2018

Blackhat, BSidesLV and DEF CON Parties 2018

| | Features
Back once again for the Blackhat, BSidesLV and DEF CON Parties 2018. Here is the list. Please note that this is a work in progress and I'll be sure to add more as I become aware of them. The post Blackhat, BSidesLV and DEF CON Parties 2018 appeared first on ... Read More
If An Infosec Policy Falls In The Forest

If An Infosec Policy Falls In The Forest

| | Briefings, Features
When you are building an Information Security practice you need a solid governance structure in place. For those of you who might not be familiar we can look at it a more accessible way. If you are building a house you need a solid foundation otherwise the thing will collapse ... Read More