Data protection for humans. What are the basics (and how can you protect your data with stuff you already have)?

I recently had a conversation about data protection, specifically protecting the confidentiality and integrity of sensitive data.  Over the course of that conversation, realized that there is a LOT of confusion on the topic. How do we protect data? When does the data have to be protected? What constitutes protected?  Ultimately, we discovered that the […]

Breaking in with the Internet of Things (IoT)

The Internet of Things (IoT) has ushered in a new level of connectedness for homes and offices alike. We’ve gone from wired desktops to now wireless thermostats, nanny cams, refrigerators and even door locks at home and the office. There’s no question that there are benefits to having everything ‘connected’, but there’s also no question […]

Hacking a penetration tester

I just finished reading this article titled “Hacking a Penetration Tester” and made a few notes that I thought may be helpful to pass along.  The basic premise of the article is that the author (Wesley McGrew) and his team were conducting a penetration test and found a Meterpreter shell that had been left behind […]