policy
What is NAS-ID?
The Network Access Server (NAS) is the frontline of authentication – it’s the first server that fields network authentication requests before they pass through to the RADIUS. The NAS Identifier (NAS-ID) is ...
Stolen Source Code, Apple Zero-Days, Biden’s Privacy and Cybersecurity Policies
In episode 147 for November 16th 2020: The latest about source code stolen from US government agencies and private companies, three actively exploited iOS zero-days in the wild and new App Store ...
5 Lessons Learnt from BJJ that Are Applicable to Cybersecurity
Over the last decade, I have focused quite heavily on technology and the cybersecurity space. I’ve been motivated to create a world that is more inclusive and safer. In 2019, I began ...
Identity Gateways ❤️ Web Isolation
How to create a flexible and secure data delivery channel by combining web isolation with an identity & access management gateway or identity provider (IdP) ...
Secure Working from Home – Some Ideas and Guidance
There is plenty of information out there how to secure a “Home Office” environment in these days and I do not want this to be another one. However, I tried to compile ...
Cyber Threat Intelligence: Lack of Training, Tools, Oversight
New research cites a lack of training, tools, and oversight for cyber threat intelligence analysts. How to leverage CTI without exposing your organization: ...
COVID-19 and Remote Work: Crisis & Opportunity
Remote work has gone from”nice to have” to “must do” in a matter of days for many, due to the COVID-19 pandemic. Historically, the federal government and especially the Department of Defense ...
5 Ways Your Organization Can Ensure Improved Data Security
Each year on January 28, the United States, Canada, Israel and 47 European countries observe Data Privacy Day. The purpose of Data Privacy Day is to inspire dialogue on the importance of ...
Policy and Procedures – Security Compliance
All organizations have policies and procedures on how particular tasks and goals are established within the organization. The issue here is many of these are either word of mouth or haven’t been ...
Nexus Repo and Datree Integration Deliver Automated Pipeline Control
If your organization or development team currently uses, is considering, or has plans to use open source software to accelerate development and innovation, then you are likely familiar with the transformational shift ...

