Christmas is supposed to be about peace on earth, but bad news has been everywhere this week in the cybersecurity world, largely because of Log4j. But we’re not going to talk about that. If you are trying to wrap your head around what it is, we like these resources...
It’s Not If, but When: Incident Response and Data Retrieval
Three days ago, the Swiss Government Computer Emergency response team blazed a warning regarding a zero-day exploit: Log4j. It is hard to overstate just how critical this exploit is – arguably the most significant cybersecurity threat ever. On a criticality scale of...
Insider Solutions to Insider Threats
All names have been changed to protect the identities of the people in this real-life example. Here's a true story. Matt, a 'disgruntled employee,' got mad at his employer. Deciding to get even with his organization, he created a script to steal his own credentials,...
Cast Cybersecurity Vision, Not Fear
You must cast vision for effective cybersecurity. The cybersecurity industry thrives off fear. Fear of missing out (FOMO), or fear that something deleterious will happen if you don’t act with haste, etc. Even marketing strategies appeal to a sense of fearful urgency!...