Run Microsoft(Powershell) Software On Linux? More Risk
Did you think it would never happen? Microsoft and Linux are increasing in their ties to each other. So as we protect systems in our networks, we are increasingly incorporating…
Innovation and Cybersecurity
The obvious angle(in 2018) is to applaud Amazon and chide Sears for the massive technological progress and stagnation respectively. Sure Sears did well in it’s day by pioneering catalogs and…
What Does it mean? PCI DSS Validation Process
VISA had a presentation last week online to discuss this very question “PCI DSS Validation Process” We will get into the list shortly… First let’s discuss why one needs a…
Test Your Incidence Response Plans
So we all must have an Incidence response plan, which is only used after a computer security problem: Detect problem Investigate problem What type of the threat to the business?…
How are Hackers Always a Step Ahead of Defense?
So the Defense (also known as Blue team) has been inundated with spam, the goal of the spam(for the hackers) is for an unsuspecting user to give up their credentials(username…
