
The world of PUP(s) and no, sadly, we are not talking puppies.
Ransomware, which tries to get money from victims by taking over computer home pages. Source…
Ransomware, which tries to get money from victims by taking over computer home pages. Source…
In a rapidly evolving digital landscape, cyber supply chain security has become a paramount concern for both public and private sectors…
and Why Should we Use It?
In my last blog post, I discussed my favorite definition of “quality.” In it, I referred to Quality Assurance testers and some types of…
I have been testing software for a lot of years: first as a power user of software that my company purchased, then as part of my job…
How it applies to Industrial Automation and Control Systems (IACS) and Operational Technology (OT) Control Systems
Big news in GovCloud came around last week as AWS announced Control Tower support in all GovCloud (US) regions. If this doesn’t seem that…
Today’s threat actors make use of a variety of information to tailor their attacks against organizations and individuals. By collecting…
When properly deployed and up-to-date, antivirus (AV) software is an important part of a defense-in-depth strategy to guard against…
Industrial Control Systems (ICS) and Operation Technology (OT) Control Systems are computer-based systems used to control physical…
Most penetration testers can tell you that they commonly see Secure Socket Shell (SSH), Remote Desktop Protocol (RDP), Network Basic…
An Early Obituary for MilCloud 2.0