Understanding Biden’s Invocation of the Defense Production Act

On Feb. 5, the Biden administration announced plans to leverage the Defense Production Act (DPA) to bolster vaccine production, boost the availability of at-home and point-of-care virus tests, and increase the supply of critical shortages in personnel protective equipment such as masks, shields and gloves. Alongside the use of the DPA, the Pentagon announced plans […]

Cloud-Based Storage Misconfigurations – Understanding the Security Risks and Responses

Misconfigurations remain one of the most common risks in the technology world. Simply telling organisations to “fix” this problem, however, is not as easy as it might first seem because there’s a myriad of technologies at play in modern infrastructure deployments. All of this results in a complicated mix of hardening approaches for each system. […]

Cybersecurity Challenges: Understanding the What, How and When of Change

I subscribe to a newsletter from Gary Burnison, CEO of Korn Ferry. His messages address a wide variety of career and personal issues in a thoughtful and educational manner. A recent Special Edition message was titled Exceeding Potential. It specifically addressed how opportunities present themselves and how to view and leverage them. He closed his […]

MalwareTech, WannaCry and Kronos – Understanding the Connections

As Marcus Hutchins was on his way home to the UK after attending Def Con and Black Hat in Las Vegas, NV, the FBI arrested him. This event sparked immediate internet outcry, especially among the cybersecurity community, as Hutchins was better known as MalwareTech and had just made cybersecurity fame by stopping the WannaCry ransomware […]

Understanding Network Hacks: Attack and Defense with Python

Understanding Network Hacks: Attack and Defense with Python This book explains how to see one’s own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google […]