March 21, 2024

The Not-so-True People-Search Network from China

It’s not unusual for the data brokers behind people-search websites to use pseudonyms in their day-to-day lives (you would, too). Some of these personal data purveyors even try to reinvent their online identities in a bid to hide their conflicts of interest. B...

Read article →
March 12, 2024

Patch Tuesday, March 2024 Edition

Apple and Microsoft recently released software updates to fix dozens of security holes in their operating systems. Microsoft today patched at least 60 vulnerabilities in its Windows OS. Meanwhile, Apple’s new macOS Sonoma addresses at least 68 security weaknes...

Read article →
June 12, 2023

Building a Remote Working Environment

How To Build A Cloud-Only Business Based On Three Core Security Pillars In mid-March 2020, I had several office visits, all with the same fundamental questions. "Mark, are we ready?" "Ready for what?" "To close the office and work from home."...

Read article →
May 23, 2023

Phishing Detection and Response Basics

Are SPF, DKIM and DMARC enough? I have been dealing with secure email delivery for most of my career, and I frequently find organizations not properly setting up Sender Policy Framework (SPF), Domain Keys Identified Mail (DKIM) and Domain-based Message Au...

Read article →
May 15, 2023

Cloud Services You May Be Overlooking

Are your workloads using the latest Cloud technologies? Companies moving workloads to the Cloud often are doing so with a monolithic approach because that is the traditional mindset of IT architectures.  Using this approach adds risk for availabil...

Read article →