Luxury EV Cadillac Lyriq Wows Critics With Knobs and Buttons

I’ve never been a fan of screens in cars. The last thing I want are “idiot lights” on a dashboard. Lo and behold the new Cadillac EV designers understand why touch means haptic, and they’ve delivered a proper sightless user inte…

Home Security Tips While You Design Your Home

You’re about to re-design your home, and you want to make sure that it’s safe. But how do you go about doing that?
The post Home Security Tips While You Design Your Home appeared first on At Home in the Future.

How to Make Sure Your Home Is Safe While You’re Away Exploring

If you’re someone who travels a lot or goes camping over the weekend, you’ll more than likely be leaving your house empty during that time.
The post How to Make Sure Your Home Is Safe While You’re Away Exploring appeared first on At Home in the F…

Integrity Monitoring with Website Security

We spend a lot of time talking about the tools at our disposal to prevent hacks. Tools like security plugins, or cloud-based WAF’s, but we need to remember that security is a cyclical process. A comprehensive thought process forces us to be be co…

Instagram Being Hacked via Password Reset Option

This is a public service announcement for all users to be aware of an active scam happening right now that is targeting instagram users. This is a nasty, but effective, social phishing campaign that takes advantage of a relationship you …

Jupyter Notebook for crt.sh Queries

I created a Jupyter Notebook to query the crt.sh website, dump the results into a pandas data frame, and then printing out the unique list of results to the screen for OSINT investigations.

Addressing the Cloud Security Readiness Gap

Cloud security is about much more than security functionality. The top cloud providers all seem to have a capable suite of security features and most surveyed organizations report that they see all the top cloud platforms as generally secure. So, why d…

Defensive Security Podcast Episode 252

https://www.bankinfosecurity.com/capital-one-must-turn-over-mandiant-forensics-report-a-14352
https://www.databreachtoday.com/insider-threat-lessons-from-3-incidents-a-14312
https://www.zdnet.com/article/ransomware-deploys-virtual-machines-to-hide-itse…

Tornados, Necessity, and the Evolution of Mitigating Controls

According to the National Oceanic and Atmospheric Administration (NOAA), a tornado (also called a twister, whirlwind, or cyclone) is a violently rotating column of air that extends from a thunderstorm and comes into contact with the ground. Tornado intensity is measured by the enhanced Fujita (EF) scale from 0 through 5, based on the amount […]