Digital Misdeeds of the Unwitting

All cybersecurity strategies are based on considerations of the acts of sophisticated and highly motivated threat actors like ransomware groups or nation/state-sponsored actors, as they should be. InfoSec teams today rely on highly skilled Red Team professionals to...

Great Open Source comes Great Responsibility

The Solarwinds attack of 2020 thrust software supply chain attack techniques once again into the limelight. Threat actors quickly pivoted to leveraging Open Source Software to perpetuate numerous software supply chain compromises. While not a novel means of...

Multi-Factor Authentication: Battle of the Factors 

Multi-factor authentication (MFA) is an essential mechanism to defend against unauthorized access authentication attempts. Over the years, a number of algorithms and protocols have been developed to promote secure authentication factors. However, not all factors are...