security hygiene
How To Tackle the 5 Biggest Enterprise IoT Security Challenges
The proliferation of IoT devices, particularly in the workplace, has left businesses with a new set of security challenges to deal with. For any company considering investing in IoT devices, it is ...
The OPSEC of Protesting
For the past three months thousands of people have been protesting in the United States due to the deaths of George Floyd, Breonna Taylor, Tony McDade, and others. Many of the protesters ...
How Cyber Secure Is Your State?
Even the most cyber secure states didn’t score above a C average, which means there’s more work to be done Security and IT managers all over the globe have had to scramble ...
[Infographic] macOS Native Security Configurations and osquery
Be it for macOS or my dog eating out of the trash, there is no such thing as a bullet-proof security policy. It’s all about creating a threshold of standards- something to ...
Real-Time Observations in Security Hygiene
The most recent breach is notable in that several missteps occurred. These missteps are good reminders of the importance of security hygiene in a hyperconnected world. Take a moment to review and ...
Detecting Malicious Packages in Repositories like PyPI: Using Osquery for Complete Software Inventory
Many systems make installing 3rd party software incredibly convenient; from packaging systems and well loved Linux distribution tools like Debian Apt to app stores and per-language repositories. Users are also often allowed ...
Security Struggling to Stay Ahead of More Sophisticated Threats
Will organizations ever reach a point where they feel confident about their security and the ability to defend against threats and breaches? I hope the answer is yes, someday our security systems ...
Why We Strongly Advocate Ad Blocking: The Steg Affair
via Dan Goodin - Security Editor at the beloved Ars Technica, comes further proof of why we proselytize Ad Blocking both on the enterprise browser deployments, as well as network devices in ...
How the Federal Shutdown Could Do Long-Term Digital Security Damage
Most people have at least heard of the partial shutdown plaguing the U.S. federal government. Now over three weeks old, the stoppage owes its existence to a conflict over border security funding ...
PIPEDA & MDR: Breaches, Reporting and Advice
Changes to Canada’s privacy law, the Personal Information Protection and Electronic Documents Act (PIPEDA) went into effect November 1st. This regulation extends beyond the Canadian border to those companies doing business with ...

