top of page
Search


National CyberSecurity Awareness Month — 2020
National CyberSecurity Awareness Monty 2020. Unprecedented changes!
Cylidify
Nov 4, 20202 min read
0 comments


The Virtual Office and Remote Working
Teleworking security and privacy tips and best practices.
Cylidify
Mar 24, 20203 min read
0 comments


Break Glass – In Case of Emergency
Incident response in an true emergency or crisis requires a different approach. Rules and norms must be broken.
Monty LaRue
Mar 19, 20204 min read
0 comments


Internet of Things (IoT) — End-to-End (E2E)
IoT has a milestone in end-to-end, full stack offerings that are security focused!
Cylidify
Feb 28, 20203 min read
0 comments


Apply Within
Commentary on cyber talent shortages and the urgency to fill those gaps.
Cylidify
Feb 19, 20201 min read
0 comments


Penetration Testing is Dead!
… Long live Penetration Testing! A similarly juxtaposed phrase was used to announce the passing of a King and announce a new one....
Cylidify
Feb 3, 20203 min read
0 comments

Cybersecurity Agility
Cybersecurity and privacy agility necessities.
Monty LaRue
Oct 31, 20192 min read
0 comments

Phishing Basics
Phishing is "a fraudulent attempt to obtain personal or otherwise sensitive information". Don't be a caught.
Cylidify
Oct 23, 20193 min read
0 comments

Find Problems AND Help Solve Them
Sure, find problems, but help solve them or prevent them too, eh?
Monty LaRue
Oct 15, 20193 min read
0 comments


National CyberSecurity Awareness Month - 2019
NCSAM kick-off!
Monty LaRue
Oct 7, 20191 min read
0 comments

Security Games - Improve Your Odds
Or cheat against the cheaters... Again, not too much description ahead of the cartoon allowing for reader interpretation. The underlying...
Cylidify
Jun 20, 20191 min read
0 comments

Partner and Vendor Management — Breaches
There many lessons to be learned from a recent healthcare vendor (3rd-party) breach at the American Medical Collection Agency (AMCA) and...
Monty LaRue
Jun 6, 20192 min read
0 comments

Secure or Compliant?
If you had to choose one, which would you choose? Are they even different? We believe the right answers to these questions are...
Cylidify
May 22, 20193 min read
0 comments

Cybersecurity: Take the Cake
This post refers to the broad range of (cyber)security including privacy, legal, and compliance spanning development, operations,...
Monty LaRue
May 3, 20193 min read
0 comments

Offensive Security — Penetration Testing
The broad definition of Offensive Security (OffSec) includes any activities, automated or manual, that take an offensive (but ethical)...
Cylidify
Apr 26, 20194 min read
0 comments

Internet of Things (IoT) — Physical Security
This post is the second in our series on IoT security and privacy. The introductory post is a great starting point — it has an overview...
Cylidify
Apr 19, 20195 min read
0 comments

Threat Modeling — Team Building
This is the second post in our Threat Modeling series. We recommend reading the "starting out" post first to get a baseline and overview...
Cylidify
Apr 11, 20193 min read
0 comments

Internet of Things (IoT) Security and Privacy
We've heard a few times that the "S" in IoT stands for Security. It's humorous, but not actually funny given the truth behind it....
Cylidify
Apr 5, 20195 min read
2 comments

Ransomware Revisited — Response and Recovery
In part one of this series, we covered the basics of ransomware including its cyclic nature, recent resurgence, and possible evolution...
Cylidify
Jan 30, 20194 min read
0 comments

Ransomware Revisited
Ransomware is back in the news, but really, it never left. It has been revisiting again, again, and again. This is a cyclic attack that...
Cylidify
Jan 16, 20194 min read
0 comments
bottom of page