720-891-1663

Reducing Risk From Privileged Accounts

Privileged accounts represent a major vulnerability for all networks and systems. If a hacker can compromise a privileged account they can do a lot more damage than if a regular account is compromised. So what do you need to do to protect those accounts? Note that privileged accounts exist at the operating system level (Windows, […]

Continue reading → [DISPLAY_ACURAX_ICONS]

The Strategy is “Wait to get Hacked and then Panic”

As millions upon millions of IoT and Industrial IoT devices get deployed every month, we seem to have forgotten what we learned the hard way about our computers: if we don’t patch them, the hackers will invade. #1: A set of bugs called Urgent/11 affected a network module that has been around since the 90s […]

Continue reading → [DISPLAY_ACURAX_ICONS]

SBoM is NOT a Four Letter Word

I have been ranting about Software Bills of Material or SBoM for a while. This week I have two examples of why this is important – even critical. The first story is about a TCP/IP network stack and the vulnerability is called Amnesia:33. It impacts four open source libraries – uIP, FNET, picoTCP and Nut/Net. […]

Continue reading → [DISPLAY_ACURAX_ICONS]