Skip to main content

Posts Tagged ‘cybersecurity’

A group of professionals sitting at a table having a meeting.

QA Team Building 2021

An important aspect of being a Great Place to work is having a great job environment in which people know each other and their achievements and great performance are acknowledged. We know how important it is to make our peers feel seen and appreciated and a great example of that is our yearly QA Team […]

Colleagues in a brainstorming meeting

How to Design Visually Appealing Better Forms (and Not Suffer in the Process)

Forms are everyday work for developers and UI designers around the world. This can either be a usability nightmare or a perfectly applied solution that users don’t even realize it took a lot of effort to plan, design, and code. Here I’ll give you some guidance on how to better up our form design.   […]

Istock 1303320175

Adopting a Zero Trust Approach to Security – Part 2

Welcome back! Our last blog on adopting a Zero Trust approach to security gave you a high-level overview of the core principles in a Zero Trust security model. In this blog, we’ll start by discussing o the first and most important pillar, identity. Identity is the primary control plane for the Zero Trust model, which […]

Adopting a Zero Trust approach to security – Part 1

Zero Trust has become somewhat of a buzzword over the past couple of years and has been coined the new gold standard of security models as technology has changed. So what exactly does “Zero Trust” mean, and should your organization start considering adopting this model? In this blog, we’ll discuss the Zero Trust security model […]

5G Is Here, and It’s Time to Increase Your Cybersecurity Posture

5G is changing the face of communication and connection. According to Forbes, the technological innovations from 5G could contribute as much as $2.2 trillion to the global economy over the next 15 years. The service will revolutionize the amount of data collection and increasing the number of connected devices and sensors. With the rapid growth […]

Creating a Data Flow Diagram

A data flow diagram (DFD) documents the path data takes throughout your process/system. It is important to document and keep accurate and updated. Part of the value of such a diagram is that it shows where data is crossing a trust boundary. For example, user input (low trust) from a web site crosses a boundary […]

The Need for a National Health Record

In healthcare, which is more important privacy or safety? Are they mutually exclusive? In the leaps that we have made in cybersecurity in healthcare, can’t we have both? The main argument I hear against a National Health Record is people’s fear of a data breach. Contrary to that popular belief, one study, related to sharing […]

Application security assessment

How To Use The AWS API With S3 Buckets In Your Pen Test

Pen testers often need to stage payloads and other tools on servers outside of their own infrastructure.  In this post I’ll show you how to use the Amazon AWS command line interface (CLI) to dynamically create and manage S3 buckets that you can use in your own pen tests.  I’ll also show you how to […]

Ransomware Attack Affects 23 Texas Local Government Agencies

In what appears as a highly coordinated attack by a single actor, 23 local government agencies in the state of Texas were hit with ransomware. This extends the recent trend where local government entities were targeted, some of which have led to the attackers being paid millions of dollars via crypto-currency. A first line of […]

password manager

Here’s Why You Should be Using a Password Manager

I do not mean a notebook with handwritten passwords or even a spreadsheet.  I mean software designed specifically to generate and safely store your passwords.  We have all heard about sticky notes under the keyboard, or even worse on the monitor.  The current browsers can store your passwords for you and, assuming you have an […]

6 Reasons to Use Azure Active Directory

Azure Active Directory, commonly known as Azure AD, is “Microsoft’s cloud-based identity and access management service.1” It is a widely used IDaaS (identity and access management-as-a-service) that can integrate with an existing (or new) MVC-style web application, Web API, mobile app, and more to provide quick and easy authentication. I am no salesman (although it […]

FR 2052a

IoMT and the Necessity for Cybersecurity

Cyber-security: a continuous mission to supervise, support, and evolve data protection. Healthcare providers remain aware and proactive in regards to cyber-attacks or malware that feature threats to patient records, and internal documents. By continuously remaining alert, healthcare organizations can confirm their IoMT networks are secure. What is Internet of Medical Things (IoMT)? IoMT features a […]

Load More