Allergic to Shell-Phish

Phishing campaigns are still going strong as a method to gain access to systems and networks.  Specially crafted emails can be sent to unsuspecting users rendering defenses useless at the click of a mouse.  While there are many different controls to help combat the diverse attacks brought on by phishing, end user education is aContinue reading “Allergic to Shell-Phish”

Costly Configurations

This year we have seen numerous issues resulting from human error. The configurations for applications and services has led to numerous data breaches. As with most emerging technologies, Docker Containers and Amazon S3 Buckets have proven a challenge for which a learning curve should be applied. In the move to embrace cloud based services organizationsContinue reading “Costly Configurations”