Blog

15 Results / Page 1 of 2

Background

Blog Alias / August 19, 2024

World Class Service on a Local Scale

When we think about the impact of cybersecurity attacks, it’s easy to fall into the trap of believing that data is only as valuable as the ransom a company is willing to pay to retrieve it. We’ve seen this misconception challenged by the rising number of attacks on hospitals and ...

Blog Alias / August 5, 2024

Why Vegas Needs CISOs

My First Year, First-Hand Experience Last year was my first year at DEFCON, and it was very different than what I was expecting.  Yes, there were a lot of people, a lot of walking, some rambunctious Goons, and even a bomb scare.  These were more than offset by the number ...

Blog Alias / July 22, 2024

To Patch or Not To Patch? That Is The Question

The mundane of cybersecurity rarely makes the news. Breaches and ransomware are typical news fare. Last week, that narrative changed. The often unnoticed, seemingly boring procedure of patching took center stage. Even people far afield from cybersecurity or IT heard about the massive outages caused by caused by the catastrophic ...

Blog Alias / May 20, 2024

Appreciate Your IT

It’s almost summer, and you know what that means! Teacher appreciation weeks, Final exams, graduations, recitals, and burnout.  But you know who works all year round and can’t afford to get burnout?  Your school IT Team! While the rest of us wind down, their work in some ways winds up: ...

Blog Alias / May 5, 2024

Passwords, Policies, People

Last week cyberprofessionals and cyberenthusiasts celebrated National Password Day. Let’s be honest. The word for National Password Day for most people is “pass.” Most people will look at all the posts and articles (including this one) about the necessity of strong passwords and how to create them and think “I’ve ...

Blog Alias / April 29, 2024

Maximizing the Impact of Penetration Testing: 5 Key Principles

In the realm of cybersecurity, penetration testing (pen testing) stands as a critical tool for assessing and fortifying the security posture of organizations. However, not all pen tests are created equal, and ensuring their effectiveness requires attention to key principles. Understanding the purpose and conduct and having shared expectations between ...

Blog Alias / April 22, 2024

Hackers’ Hall of Shame: The Top 5 Cybersecurity Facepalms

In the world of high-profile hacks, the narrative often portrays threat actors as highly skilled and almost invincible adversaries. However, the reality we’ve encountered through our incident response (IR) work tells a different story. Not all threat actors are the criminal masterminds or uber 1337 hackers that they’re made out ...