top of page
Search
Cylidify
Nov 4, 20202 min read
National CyberSecurity Awareness Month — 2020
National CyberSecurity Awareness Monty 2020. Unprecedented changes!
0 comments
Cylidify
Mar 24, 20203 min read
The Virtual Office and Remote Working
Teleworking security and privacy tips and best practices.
0 comments
Monty LaRue
Mar 19, 20204 min read
Break Glass – In Case of Emergency
Incident response in an true emergency or crisis requires a different approach. Rules and norms must be broken.
0 comments
Cylidify
Feb 28, 20203 min read
Internet of Things (IoT) — End-to-End (E2E)
IoT has a milestone in end-to-end, full stack offerings that are security focused!
0 comments
Cylidify
Feb 19, 20201 min read
Apply Within
Commentary on cyber talent shortages and the urgency to fill those gaps.
0 comments
Cylidify
Feb 3, 20203 min read
Penetration Testing is Dead!
… Long live Penetration Testing! A similarly juxtaposed phrase was used to announce the passing of a King and announce a new one....
0 comments
Monty LaRue
Oct 31, 20192 min read
Cybersecurity Agility
Cybersecurity and privacy agility necessities.
0 comments
Cylidify
Oct 23, 20193 min read
Phishing Basics
Phishing is "a fraudulent attempt to obtain personal or otherwise sensitive information". Don't be a caught.
0 comments
Monty LaRue
Oct 15, 20193 min read
Find Problems AND Help Solve Them
Sure, find problems, but help solve them or prevent them too, eh?
0 comments
Monty LaRue
Oct 7, 20191 min read
National CyberSecurity Awareness Month - 2019
NCSAM kick-off!
0 comments
Cylidify
Jun 20, 20191 min read
Security Games - Improve Your Odds
Or cheat against the cheaters... Again, not too much description ahead of the cartoon allowing for reader interpretation. The underlying...
0 comments
Monty LaRue
Jun 6, 20192 min read
Partner and Vendor Management — Breaches
There many lessons to be learned from a recent healthcare vendor (3rd-party) breach at the American Medical Collection Agency (AMCA) and...
0 comments
Cylidify
May 22, 20193 min read
Secure or Compliant?
If you had to choose one, which would you choose? Are they even different? We believe the right answers to these questions are...
0 comments
Monty LaRue
May 3, 20193 min read
Cybersecurity: Take the Cake
This post refers to the broad range of (cyber)security including privacy, legal, and compliance spanning development, operations,...
0 comments
Cylidify
Apr 26, 20194 min read
Offensive Security — Penetration Testing
The broad definition of Offensive Security (OffSec) includes any activities, automated or manual, that take an offensive (but ethical)...
0 comments
Cylidify
Apr 19, 20195 min read
Internet of Things (IoT) — Physical Security
This post is the second in our series on IoT security and privacy. The introductory post is a great starting point — it has an overview...
0 comments
Cylidify
Apr 11, 20193 min read
Threat Modeling — Team Building
This is the second post in our Threat Modeling series. We recommend reading the "starting out" post first to get a baseline and overview...
0 comments
Cylidify
Apr 5, 20195 min read
Internet of Things (IoT) Security and Privacy
We've heard a few times that the "S" in IoT stands for Security. It's humorous, but not actually funny given the truth behind it....
2 comments
Cylidify
Jan 30, 20194 min read
Ransomware Revisited — Response and Recovery
In part one of this series, we covered the basics of ransomware including its cyclic nature, recent resurgence, and possible evolution...
0 comments
Cylidify
Jan 16, 20194 min read
Ransomware Revisited
Ransomware is back in the news, but really, it never left. It has been revisiting again, again, and again. This is a cyclic attack that...
0 comments
bottom of page