Beware of Door to Door Sales Scams During The Summer

It is that time of year again. Weather is getting nice and that brings out the army of people that some security alarm companies hire during the summer to knock on your door. These companies send large numbers of teams out on the streets and go door-to…

Read More >>

What Do We Think About Vivint Home Security

Another national company you will see advertised is Vivint.  The equipment they install is very good.  In fact, it is the same equipment we install: Reliable Home Security alarm equipment with Z-Wave enabled However, Vivint’s pricing model is to offer a little more upfront but load up with very high monthly monitoring rates.  $50, $60 […]

The post What Do We Think About Vivint Home Security appeared first on Reliable Home Security.

Read More >>

The Evolution of Mobile Security

Today, I posted a blog entry to the Oracle Identity Management blog titled Analyzing How MDM and MAM Stack Up Against Your Mobile Security Requirements. In the post, I walk through a quick history of mobile security starting with MDM, evolving into MAM…

Read More >>

A Guide To Google Hacking Techniques

Hi everyone!! As we all know Google is the major search engine and #1 ranking site and it’s like a part of our daily routine.
Google hacking does not mean to hack Google’s site/server, it means likely to be smart in Google search. Almost every kind of …

Read More >>

Kali Linux Metapackages

One of our goals when developing Kali Linux was to provide multiple metapackages that would allow us to easily install subsets of tools based on their particular needs. Until recently, we only had a handful of these meta packages but we have since expa…

Read More >>

Deep Data Governance

One of the first things to catch my eye this week at RSA was a press release by STEALTHbits on their latest Data Governance release. They’re a long time player in DG and as a former employee, I know them fairly well. And where they’re taking DG is pret…

Read More >>

RSA Conference 2014

I’m at the RSA Conference this week. I considered the point of view that perhaps there’s something to be said for abstaining this year but ultimately my decision to maintain course was based on two premises: (1) RSA didn’t know the NSA had a backdoor w…

Read More >>

IAM for the Third Platform

As more people are using the phrase “third platform”, I’ll assume it needs no introduction or explanation. The
mobile workforce has been mobile for a few years now. And most organizations have moved critical services to cloud-based offerings. It’s not…

Read More >>