Integrity Monitoring with Website Security

We spend a lot of time talking about the tools at our disposal to prevent hacks. Tools like security plugins, or cloud-based WAF’s, but we need to remember that security is a cyclical process. A comprehensive thought process forces us to be be co…

September 12, 2022
Read More >>

Addressing the Cloud Security Readiness Gap

Cloud security is about much more than security functionality. The top cloud providers all seem to have a capable suite of security features and most surveyed organizations report that they see all the top cloud platforms as generally secure. So, why d…

August 24, 2020
Read More >>

Defensive Security Podcast Episode 252

https://www.bankinfosecurity.com/capital-one-must-turn-over-mandiant-forensics-report-a-14352
https://www.databreachtoday.com/insider-threat-lessons-from-3-incidents-a-14312
https://www.zdnet.com/article/ransomware-deploys-virtual-machines-to-hide-itse…

June 1, 2020
Read More >>

Tornados, Necessity, and the Evolution of Mitigating Controls

According to the National Oceanic and Atmospheric Administration (NOAA), a tornado (also called a twister, whirlwind, or cyclone) is a violently rotating column of air that extends from a thunderstorm and comes into contact with the ground. Tornado intensity is measured by the enhanced Fujita (EF) scale from 0 through 5, based on the amount […]

December 2, 2019
Read More >>