top of page
Search
scaral161
Jun 17, 20242 min read
Encryption
I will never forget the time at a business show someone approached the AP-Cyber booth. They admitted they were out of compliance with...
7 views0 comments
scaral161
May 30, 20242 min read
Monitoring- Vital for Cyber's Future
We hear about breaches in the news constantly. We all hope we aren't the next ones to be affected. However, the truth is we will likely...
5 views0 comments
scaral161
Mar 14, 20242 min read
Compliance vs. Actual Security
Regulations serve a great purpose. They make sure folks are meeting a minimum standard. People want to know that if they disclose...
13 views0 comments
scaral161
Mar 5, 20242 min read
Penetration Tests Vs. Risk Assessments
The number one thing that everyone asks for when they come to us is a penetration test. They hand us external facing IP addresses and...
18 views0 comments
scaral161
Mar 1, 20242 min read
Change Management
There are multiple security controls listed in cyber best practices related to change management. Yet, when I talk to people many times...
16 views0 comments
scaral161
Jan 11, 20241 min read
Software Security
We all use software programs to accomplish various tasks. We've discussed in a past blog about conducting cyber evaluations before...
15 views0 comments
scaral161
Dec 27, 20232 min read
Open Source Intelligence (OSINT)
There is tons and tons of information about us that we give away freely everyday. There is social media where we are openly sharing...
68 views0 comments
scaral161
Dec 4, 20232 min read
Supply Chain- You are Only as Strong as Your Weakest Link
There are many applications that do all kinds of amazing things available. Users always want the latest and greatest. Many organizations...
11 views0 comments
scaral161
Nov 20, 20232 min read
The Onion Model- Defense in Depth
Way back when cyber used to be all about your perimeter. Organizations would put in a firewall and other tools in an effort to keep the...
5 views0 comments
scaral161
Nov 13, 20231 min read
Technical Controls Versus Process
I have met people that do not have many technical skills and are afraid that means that they can not adequately protect their...
8 views0 comments
scaral161
Oct 30, 20232 min read
Data At Rest Encryption
I was at a public event years ago covering a cybersecurity booth. Someone approached and said she had to meet encryption requirements for...
8 views0 comments
scaral161
Oct 23, 20232 min read
Vulnerability Ratings
When you conduct a vulnerability scan of your systems, things will come with ratings. You will also see ratings when a software vendor...
5 views0 comments
scaral161
Oct 16, 20231 min read
Cloud Shared Responsibility Model
The cloud has all the answers doesn't it? One might think that way from all the advertising out there. However, not all cloud services...
8 views0 comments
scaral161
Sep 11, 20231 min read
Incident Response Plan
One of the big things that surprised me when I first started trying to help local small businesses was the lack of a plan or knowledge...
3 views0 comments
scaral161
Sep 4, 20232 min read
Least Privilege
Least privilege isn't sexy. It isn't a highly technical toy that promises to do all kinds of nifty things to ward off evil attackers....
23 views0 comments
scaral161
Aug 29, 20231 min read
Physical Security
There are many cyber things that play a role in your security. But an obvious and often overlooked security item is physical security...
8 views0 comments
scaral161
Aug 29, 20232 min read
Artificial Intelligence (AI), Machine Learning (ML) and Cyber
We keep hearing about all these AI discoveries recently. But is it AI or is it ML? What's the difference? AI is when a machine thinks for...
6 views0 comments
scaral161
Aug 25, 20232 min read
Data Typing
We talked in a previous blog about how it was important to know what you have. The previous blog focused on an inventory of your software...
9 views0 comments
scaral161
Aug 10, 20232 min read
Passwords and Multi-factor
Everyone hates having to remember long passwords. As time has gone on, passwords have had to get longer. We started adding complexity. We...
11 views0 comments
bottom of page