Cybersecurity: Hacking Proprietary Protocols with Sharks and Pandas

Cybersecurity: Hacking Proprietary Protocols with Sharks and Pandas

There is a constant war which plagues cybersecurity; perhaps not only in cybersecurity, but in the world all around us is a battle between good and evil.  In cybersecurity if the “evil” side understands or pays more attention to a technology than the “good” side, we see a spike in cyber-attacks. The human race commonly fears what it doesn’t understand.  In a time of war, this fear is even greater if one side understands a weapon or technology that the other side does not. This course of events demands that both offensively and defensively minded “good guys” band together to remove the unknown from as much technology as possible. One of the most common unknown pieces of technology in...

Security admins checklist: 10 tasks to perform every year

Here is a checklist of 10 important tasks security administrators should perform to keep devices protected and secure. Security administrators oversee the secured processes in place, safeguarding the day-to-day operations of an organization. While it is easy for users to focus solely on protecting computers and their devices, security admins are tasked with managing the overall landscape–including LAN/WAN, services, the devices used to access those services, and the most unpredictable factor of them all: The end user. Below is a checklist list of 10 items that should be performed  to ensure that devices and networks remain secured throughout the year. 1. Update your company’s policies Corporate policies governing computing systems, networks, and acceptable-use should be updated regularly to ensure they...

Scroll to top
Exit mobile version