Blog

The Internet Control Message Protocol (ICMP) – Part 1

Introduction There are many security tools (such as those of Firewalls, Network Intrusion Devices, Routers, etc.) out there that can alert a Network Administrator of any penetrations that are occurring.  But these devices, for the most part, can only detect those Cyberthreats that are coming from the external environment. In addition to this, what is also needed ...

Read More

The Next Behavioral Biometric – Signature Recognition

Overview When compared to the Physical-based Biometrics, there are only two Behavioral based Biometric modalities. The last article covered a technology which has been around for quite a long time, which is that of Keystroke Recognition. In fact, it even dates all the way back to when the Morse Code first came out. From the various signals ...

Read More

Breaking Down What A SIEM Is & Its Benefits

Introduction In dealing with today’s Cybersecurity threat landscape, businesses and corporations have deployed many tools from different vendors to beef up their lines of defense.  The thinking here is that more is better, but this is only increasing the attack surface for the Cyberattacker.  There is now a fundamental shift in this kind of thinking, and ...

Read More

Road To Gold

The road to the Junior Olympics is not one paved with gold! Our Co-Workers son Isaac Campbell is a superb Water Polo player and an already established medal-winning swimmer. Assist this young champion in becoming the next athlete to don the cover of a Wheaties Box! $1,800.00 is the goal, please give what you can.Click ...

Read More

The Top 5 Pentesting Tools You Will Ever Need

Introduction There is no doubt today that the threat landscape is changing on a daily basis. It seems like that hardly one threat is discovered that many unknown ones are still lurking. One of the best ways for businesses and corporations to defend themselves is through Penetration (Pen) Testing. This article will provide an overview of ...

Read More

Never Use Airport USB Charging Ports – Or Cords Laying Around

This Forbes article details how hackers are targeting travelers using public USB charging stations. In addition, never use a charging cord or random USB storage device you may find laying around – chips hidden inside can hack your computer and steal your data. This intel courtesy of X-Force Threat Intelligence at IBM Security and via ...

Read More

CISA Statement on Iranian Cybersecurity Threats

WASHINGTON – In response to reports of an increase in cybersecurity threats, the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher C. Krebs issued the following statement: “CISA is aware of a recent rise in malicious cyber activity directed at United States industries and government agencies by Iranian regime actors and ...

Read More

Offices Laying Out Results

Businesses are always looking for ways to increase employee productivity in order to increase revenue. In the highly competitive business world, business owners often find themselves asking, “how is our office space impacting employee productivity, and what can our business do about it?” It’s no secret that businesses lose money when employees aren’t productive. Many ...

Read More

Divided We Fall – Importance of Company Culture

We must talk more openly than we have done in the past about fear and trust at work. Fear and trust are the chemical currents that power every good or bad thing an organization does, but we seldom talk about them and it hurts us not to. We pretend there are no currents. We focus ...

Read More

Traditionally Flawed

Think about your workspace, what makes it unique, what benefits are there for working the same space as your coworkers. In an office you can walk over to a co-worker and show them a document you’ve been working on; need to hold a meeting? just grab a conference room down the hall, want to plan ...

Read More