Why is an “APRICOT” critical to Asia/Pacific Internet Operations?

There is one conference where Asia & Pacific Critical people resources meet to maintain the operational relationships critical to the success of the Internet. Are you going to Asia Pacific Regional Internet Conference on Operational Technologies (APRICOT)? People glue together the Internet and Telecom. People who meet, collaborate, and work with each other to keep Read More

Bad Guys are Scanning Your Network!

Bad guys are scanning your network. They are finding all the vulnerabilities exposed to the Internet. The vulnerable systems, critical devices, and other ways to break into your network. When ransomware, malware, botnets, and other break-ins happen, people wonder, “how did the threat actors find that service?” People thought that “if we don’t publish it, Read More

How do Security Experts surf the tidal wave of security news?

Have you ever wondered what security professionals review each day? How do they keep up with the security news? What sources do they use? If you are new to security, what sources shall you track? We are overwhelmed with a deluge of cybersecurity news. In essence, we’re surfing cybersecurity news trying to keep up and Read More

1 Yottabyte DDoS Attack – The Biggest DDoS Attack in History!

No, a yottabyte DDoS attack has not happened. Someday we will have a yottabyte DDoS, just not today. Tomorrow we will have another press release on “the largest DDoS attack ever.” Will that be important? No, bragging about the size of DDoS Attacks is a distraction to the realities of the Internet and the real Read More

“Backups” will not save you from a Ransomware Incident

“What do you mean the backups don’t work? I thought you said backups would save us from a Ransomware incident?” Good backups are the #1 recommendation you will see in all “Ransomware Defence” guides. We have a problem in the industry. These “ransomware guides” are written by people who have never lived through a major Read More

US Warns Ransomware Threats during Holidays – Whoops! Too Late

If you are reading about potential ransomware threats during the holidays, just know it is too late. By the time you get a call waking you up on a labor day holiday break, it would be too late to stop the ransomware threat. People forget that ransomware is the monetization network break-in. The THREAT is Read More

“Security” is always an afterthought in the C-suite

Get around “security is an afterthought” by rethinking security as part of the business resiliency architecture. Read More

Open SMTP (Email) Servers on Your Network

Do you know if you have open SMTP servers on your network? In May, Qualys released 21 vulnerabilities to Exim (see Qualys Security Advisory 21Nails: Multiple vulnerabilities in Exim). Exim is a popular Mail Transfer Agent (MTA) available on Unix operating systems and comes pre-installed on Linux distributions. The easy access and wide SMTP/Exim MTAs use Read More

Protect Your Network from an Internet Worm during COVID-19

Do you want a repeat of Wanacry? Do you want an Internet Impacting Worm in the middle of the COVID-19 Crisis? All organizations can take two steps to minimize the risk of a potential Internet worm. First, they can deploy an access-lists on the edge of their network that block TCP/UDP port 445. This can Read More

Get Started in the Security Industry

  Get started in the Security Industry, What are my first steps? If you are reading this, you are doing the right type of security digging. You are looking for ways to get started in the security industry. You have a desire to dive deep in the security world. Welcome to the world of chaos, Read More