Search results

Blog

Category

How to make PCI compliance a little easier for everyone

Is PCI compliance slowing you down? Read about our compliance services or reach out directly with any questions about your journey to compliance. Before we begin, there’s one thing to make very, very clear:   You Cannot Outsource ALL Compliance I do not...

The Human Firewall is a Lie

In 1919, a man founded a company to sell dubious investments in international postal trading. The company made no profit or tangible product. Despite this, the man sold millions of shares in his company. With each investor, he would funnel the money into dividends to...

2018 Cybersecurity Predictions

That was a fun year: mega breaches, everybody rebranding as artificial intelligence, Russian hackers, and Symantec only bought three companies. Oh and BLOCKCHAIN….because, blockchain. If you thought 2017 was fun, wait for it. 2018 is going to be a hoot. Here are...

Ulterius Zero Day Disclosure

Every now and then, an regular penetration test project can take a decidedly irregular detour into the land of zero-day exploits.  In October 2017, I discovered a zero-day vulnerability in Ulterius, a widely used, open-source remote access software. Come along. I have...

GDPR is Coming

On May 25th, 2018, the European Union’s General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) officially goes into effect.  No need to panic. We got this. GDPR has rapidly devolved into a touchstone for everything from vendor FUD to political frothing. ...

Webinar Video: GDPR is Coming

Webinar: GDPR is Coming The European Union’s General Data Protection Regulation (GDPR) wakes up and starts eating people on May 25th, 2018. You cannot stop it. You cannot reason with it. You cannot send it north of the wall. And you absolutely cannot afford to...

Webinar Video: Think Like a Hacker

Presented by Anitian & Mouser Electronics. When your job is to create and build new product, intentionally breaking your creations seems wrong. Not to a hacker. They do not see your products as elegant designs that solve problems. Hackers see your product as a...