May2017

The Attack Seen Around the World

The attack seen around the world. In one of my more recent posts, I brought attention to the release, or better yet the data dump of exploits and hacking tools targeting Microsoft’s Windows OS, Linux, firewalls, and others. One of the main purposes of my post was to bring attention to the grave dangers that these exploits bring to the world and as such, I really hoped that there would be enough interest from individuals in the industry to get a copy of the exploits and contribute to the countermeasures that would be needed to defend against exploits to better protect and defend the companies and corporations that we all represent. I was absolutely sure that there would be many individuals around the world that would be reverse engineering the exploits for more devious purposes and it appears that we have just experienced the first, of what I believe, to be just the beginning attacks seen around the world.

Dec2014

Cloud Dependency: Data Protection and Security

The premise of security is confidentiality, integrity, and availability. The premise of data protection is integrity and availability. The two go hand in hand. However, it is often the case that certain groups within organizations handle data protection (disaster recovery, …
Read More “Cloud Dependency: Data Protection and Security”