Evolution of Warfare

Evolution of Warfare

The gradual shift from traditional warfare utilizing boots on the ground, artillery, and an air force to cyberwarfare techniques promoted by hackers with malware has been occurring for more than a decade. Clearly, soldiers and bombs are going nowhere anytime soon, but...
STAR Guidelines (Annotated)

STAR Guidelines (Annotated)

Standards for Technology in Automotive Retails (STAR), is a nonprofit organization who has recently published suggested guidelines encouraging

What SecOps Means

What SecOps Means

“What the hell does SecOps mean, really?” I’ve heard derivatives of this question numerous times. From my perspective, the short answer is: “SecOps is a movement that’s making security everyone’s problem.” Security Operations doesn’t just involve security or IT...
Isn’t the InfoSec community great?

Isn’t the InfoSec community great?

Isn’t the InfoSec community great? If you didn’t hear, a phishing attack targeting GSuite customers hit Internet-wide today (links below with details). What I’m most fascinated about is the speed with which information about this attack is being populated by the...
It’s All Geek To Me

It’s All Geek To Me

Penetration test reports can be overwhelming. The average report can be a hundred pages and full of technical jargon that even IT managers find daunting. When this is the case, the final report is often shelved, thereby wasting the thousands of dollars spent on the...
Distrust and Verify Anyway

Distrust and Verify Anyway

Security is based on establishing trust. Who should you trust? When should you trust them? How much should you trust them? Often, this “trust” conversation centers on a binary distinction between “trusted insiders” and “unknown outsiders”. However, even the “trusted...