Test Your Incidence Response Plans
So we all must have an Incidence response plan, which is only used after a computer security problem: Detect problem Investigate problem What type of the threat to the business?…
How are Hackers Always a Step Ahead of Defense?
So the Defense (also known as Blue team) has been inundated with spam, the goal of the spam(for the hackers) is for an unsuspecting user to give up their credentials(username…
NIST 800-171 Compliance Can be Done Quickly!
NIST 800-171 Compliance actually means DFARS Cybersecurity requirements must be met. The NIST 800-171 requirements have always vexed small manufacturers due to the specific wordiness, so the NIST (National Institute…
Does Outsourcing Make You More Secure?
Outsourcing is good, since we cannot specialize in everything we can focus on sales or inventory instead of mundane tasks. So what is important and what is mundane? That depends…
New Wi-Fi attack found on WPA2 using PMKID
This could make many “thought safe” Wi-Fi routers not so Here is where paying attention to new attacks is important. hashcat.net has the information: This attack does not even need…
