Hybrid Source Security

The Open Source Movement For those living under a rock, there is a massive effort underway by the government, military, and large corporations to move away for proprietary, closed systems to open source projects.  There are just too many issues with closed source...

Stopping Malware’s Main Challenge

Why Malware Hurts A random office colleague opens a very realistic email and inadvertently downloads a small piece of software called a “payloader”.  That payloader then calls home and a remote hacker starts injecting various malware – viruses really...

Network Isolation Has Failed

Flawed RoutingI remember a few years ago when I was talking with some people in charge of building nuclear plants and how they went on and on about how secure their systems were due to network isolation.  I kept attempting to point out that between their new Internet...

Is It All A Scan?

Scanning RealityAs part of my continuous effort to keep on top of cybersecurity, I was watching a CEH video yesterday which overviewed the various ways in which hackers search for vulnerabilities.  It all came down to the same end result – port scanning. I then...

Truly Secure Mobile Devices

I Can Hear YouA recent article brought to light – again – that all of our collective phone calls, texts, and video chats are completely exposed.  This is not new as many articles have discussed the complete lack of security for phone calls.  In fact,...