What If a Cybersecurity Black Swan Event Happens?
In Other Words – instead of assuming a risk profile, and assess risks – assume it will happen to you (it is just a matter of time). Now what? In…
Defend Your Systems
In Other Words – instead of assuming a risk profile, and assess risks – assume it will happen to you (it is just a matter of time). Now what? In…
Let us not make the same mistakes as we may have done in the past when it was time to move to a new year. We should review the current…
Affected Software A significant number of Java-based applications are using log4j as their logging utility and are vulnerable to this CVE. To the best of our knowledge, at least the…
Due to an actively exploited zero-day vulnerability: https://thehackernews.com/2021/12/extremely-critical-log4j-vulnerability.html This bug is a 10 of 10 on the CVSS rating from the article a snippet: Tracked as CVE-2021-44228 and by the…
How much cybersecurity do you need? Just enough to stay out of the news? Will you ever be in the news? Have you had an incident response evaluation? Do you…