720-891-1663

Wikileaks Publishes CIA Hacking Tools – Round One

It seems like the spy-guys (or is it spy-people) can’t seem to catch a break.  First it was Snowden; more recently it was Martin – both Booz Allen contractors at the NSA.  Now it is the CIA.  Wikileaks published thousands of documents, which appear to be real, describing CIA hacking tools.  This includes, supposedly, at […]

Continue reading → [DISPLAY_ACURAX_ICONS]

What Does Mike Pence’s Use of A Personal Email Account Teach Us?

The Washington Post is reporting that Vice President Mike Pence used a personal email account to conduct government business when he was Governor of Indiana. The Veep says that his use of a personal email account is different than Clinton’s use of a personal email account and I do not want to turn this into […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Stewart International Airport Data Breach Self Inflicted

Stewart  International Airport has a long history.   In 1930 Thomas Stewart convinced his Uncle to donate land for an airport to the city.  In 1939 the U.S. Military Academy at West Point  built the first airfield at Stewart and in 1948 it became Stewart Air Force Base.  In 1970 the State of New York bought […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Why Application Penetration Testing is Critical

Application penetration testing or pen test is more critical than ever and news today is only the most recent example of why. Spiral Toys makes a line of Internet connected teddy bears (aka smart bears, I guess) that allows parents and children who were physically apart to share personal messages. Unfortunately for the purchasers of […]

Continue reading → [DISPLAY_ACURAX_ICONS]