

Credentials, the Keys to the Kingdom
On August 30th, I was honored to be the keynote speaker at a lunch and learn event organized by Proofpoint Inc. in Palo Alto, California....

Cyber Risk Update 5 MAY 2023
Bonus Get more on Discord (Local Government Cyber Watch) invitation link works for the next 7 days https://discord.gg/HzafrnTf Local...

Protecting Critical Infrastructure: Insights from the Dragos ICS & OT Year in Review for 2022
One of the sessions I attended at the RSA Conference was "The Industrial Cyberthreat Landscape: Year in Review Report with Updates." The...


Cracking the Code: Unveiling the Secrets of the Knights Templar's Authentication Methods
Encryption and Codes: A Historical Look at Authentication Methods Do you think the security measures of the past were effective enough to...

Three Cybersecurity Bad Practices You Should Avoid to Protect Your Organization
What Not To Do: The CISA's Bad Practices In today's digital age, cybersecurity is critical to the smooth functioning of organizations,...