+1.813.321.0987
Infosec Articles (5/13/19 – 5/27/19)

Infosec Articles (5/13/19 – 5/27/19)

An article from IBM Security about macro malware is one of our favorites from the last couple of weeks. It covers some of the attack vector’s history and provides tips for how to detect this kind of malicious activity. A new Mirai variant is targeting routers,...
Infosec Articles (4/29/19 – 5/13/19)

Infosec Articles (4/29/19 – 5/13/19)

Ransomware has been a hot topic the last couple of weeks. We’re seeing its versatility, with distribution techniques spanning server vulnerabilities to advertising platforms, along with the use of AV tools to distract from its activities. There’s yet...
Postpassword Security with FIDO2

Postpassword Security with FIDO2

Welcome to the dawn of the post-password world. Multifactor authentication orbits it and two-factor authentication is just a short ride away. A new adoption campaign has launched, and it’s bound for broad enablement of FIDO2. FIDO2 will be the first stop after...
Infosec Articles (3/30/19 – 4/13/19)

Infosec Articles (3/30/19 – 4/13/19)

Finally, some relief from the Windows updates process that has annoyed users the world over for years! We’re seeing new tricks used by old malware and vice versa; ex. Emotet intercepting email conversations and injecting malware links.  For more articles, check...
Tips for Establishing Your Security Program

Tips for Establishing Your Security Program

(And How the Cyber Insurance Industry May Help You for Free) I won’t keep you waiting. Before you get too excited about that free assist from the cyber insurance industry, let me be clear: it won’t, directly. But that’s no problem. Resourcefulness benefits any...