720-891-1663

Why The Software Supply Chain is The Rhinoceros Head in the Corner

As if Yahoo didn’t have enough trouble, it apparently was using a third party software library called ImageMagick which had a serious security bug in it. The library which is used to manipulate images is very widely used.  Or at least, it was.  Some people say that it has not aged well. Security researcher Chris […]

Continue reading → [DISPLAY_ACURAX_ICONS]

One Login Cloud Identity Manager Has Critical Breach

Onelogin, a cloud based identity and access manager, reported being hacked on May 30th.  This is the challenge with cloud based IDaaS managers. WARNING: Normally I try to make my posts non-techie.  I failed at this one.  Sorry!  If the post stops making sense, then just stop reading.  I promise that tomorrow’s post, whatever it is, will […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Booz | Allen | Hamilton Can’t Catch A Break

In 2013 Booz employee and NSA contractor Edward Snowden flew to Hong Kong after leaking huge quantities of highly classified NSA documents, proving that even the NSA is challenged to keep secrets under wraps.  Those documents are still being dribbled out today. Earlier this year, when the FBI was trying to track down the Shadow […]

Continue reading → [DISPLAY_ACURAX_ICONS]