Image Source:  Wikimedia

Security Mindset, Indeed

Image Source: Wikimedia via The Grugq, come's an enlightening view focusing on the security mindset of the original architects of the now ubiquitous internet. If you can tear your sequestered, hunkered-down or ...

Key OT Cybersecurity Challenges: Availability, Integrity and Confidentiality

Organisations are still underestimating the risks created by insufficiently secured operational technology (OT). One current example comes from Germany. According to a report by heise.de, external security testers consider it “likely” that ...

How Organizations Can Achieve Security Availability

| | availability, Cloud
We have seen great strides in improving security tooling and processes over the past ten years. Via constantly maturing security models, security teams have become increasingly dependent upon an ever-more complex toolchain ...
There Are No Backups

There Are No Backups

The truth is that a vast number of System Engineers, Systems Administrators, Backup Administrators and Security Engineers habitually fail to test backups of their respective organization's data, resident at off-premises/on-premises cloud infrastructure ...
Simple to Use Link Availability Solutions

Simple to Use Link Availability Solutions

Previously, I discussed how rerouting data center host infrastructure should be part of next-generation DDoS solutions. In this blog, I will discuss how link availability solutions should also play a part. Traditional ...
Forget C-I-A, Availability Is King

Forget C-I-A, Availability Is King

In the traditional parlance of infosec, we've been taught repeatedly that the C-I-A triad (confidentiality, integrity, availability) must be balanced in accordance with the needs of the business. This concept is foundational ...