Revisiting the Apache Log4j Vulnerability
by Danielle Corsa on March 3, 2022 at 1:00 PM
By now, most are aware of the Apache Log4j vulnerability that was announced in December of 2021. The exposure is widespread in Java applications, and I have been discovering that many companies are affected by it. Remediation is imperative to ensure that attackers do not exploit affec …
Password Complexity – Going Beyond the Minimum Requirements
by Peter Fellini on February 23, 2022 at 1:00 PM
As the frequency and scale of cyberattacks has risen sharply over the past decade, we as end users have been repeatedly asked (and often required) to increase the complexity of our passwords. Back when the internet was in its infancy, the idea of creating a complex and tough-to-guess …
Zero Trust as Learned from My Grandmother
by CJ Hurd on February 2, 2022 at 3:00 PM
I have a line I use with my kids (mainly my teenagers, not so much my nine-year-old yet); “I trust you until I don’t”. They know the line well and sometimes will even finish it for me. I have raised them to hopefully make good decisions and to tell the truth, with the idea of keeping …
Cyber & Physical Security: Why You Need Both
by Kelly O’Brien on January 27, 2022 at 2:30 PM
Cybersecurity attracts an enormous amount of attention due to cyberattacks that are publicized daily. As more devices are connected to the Internet, they become attractive targets for criminals; therefore, the attack surface increases exponentially.
Is Your Head in the Cloud? Traditional Security vs. Cloud Security
by Kelly O’Brien on December 31, 2021 at 3:30 PM
When someone asks you if your head is in the clouds, there is an implication of being impractical. However, in a cloud-based environment, or in those organizations that conduct part or all of their operations in the cloud, the question has quite the opposite meaning.
The Greatest Vulnerability Still Remains – End Users
by Kyle Daun on December 15, 2021 at 1:00 PM
Recently, I had the opportunity to attend the Boston Cyber Security Summit. One of the most common topics discussed at the event was organizations’ information being compromised by the end user.