CylidifyNov 4, 20202 minNational CyberSecurity Awareness Month — 2020National CyberSecurity Awareness Monty 2020. Unprecedented changes!
CylidifyMar 24, 20203 minThe Virtual Office and Remote Working Teleworking security and privacy tips and best practices.
Monty LaRueMar 19, 20204 minBreak Glass – In Case of EmergencyIncident response in an true emergency or crisis requires a different approach. Rules and norms must be broken.
CylidifyFeb 28, 20203 minInternet of Things (IoT) — End-to-End (E2E)IoT has a milestone in end-to-end, full stack offerings that are security focused!
CylidifyFeb 19, 20201 minApply WithinCommentary on cyber talent shortages and the urgency to fill those gaps.
CylidifyFeb 3, 20203 minPenetration Testing is Dead!… Long live Penetration Testing! A similarly juxtaposed phrase was used to announce the passing of a King and announce a new one....
CylidifyOct 23, 20193 minPhishing BasicsPhishing is "a fraudulent attempt to obtain personal or otherwise sensitive information". Don't be a caught.
Monty LaRueOct 15, 20193 minFind Problems AND Help Solve ThemSure, find problems, but help solve them or prevent them too, eh?
CylidifyJun 20, 20191 minSecurity Games - Improve Your OddsOr cheat against the cheaters... Again, not too much description ahead of the cartoon allowing for reader interpretation. The underlying...
Monty LaRueJun 6, 20192 minPartner and Vendor Management — BreachesThere many lessons to be learned from a recent healthcare vendor (3rd-party) breach at the American Medical Collection Agency (AMCA) and...
CylidifyMay 22, 20193 minSecure or Compliant?If you had to choose one, which would you choose? Are they even different? We believe the right answers to these questions are...
Monty LaRueMay 3, 20193 minCybersecurity: Take the CakeThis post refers to the broad range of (cyber)security including privacy, legal, and compliance spanning development, operations,...
CylidifyApr 26, 20194 minOffensive Security — Penetration TestingThe broad definition of Offensive Security (OffSec) includes any activities, automated or manual, that take an offensive (but ethical)...
CylidifyApr 19, 20195 minInternet of Things (IoT) — Physical SecurityThis post is the second in our series on IoT security and privacy. The introductory post is a great starting point — it has an overview...
CylidifyApr 11, 20193 minThreat Modeling — Team BuildingThis is the second post in our Threat Modeling series. We recommend reading the "starting out" post first to get a baseline and overview...
CylidifyApr 5, 20195 minInternet of Things (IoT) Security and PrivacyWe've heard a few times that the "S" in IoT stands for Security. It's humorous, but not actually funny given the truth behind it....
CylidifyJan 30, 20194 minRansomware Revisited — Response and RecoveryIn part one of this series, we covered the basics of ransomware including its cyclic nature, recent resurgence, and possible evolution...
CylidifyJan 16, 20194 minRansomware RevisitedRansomware is back in the news, but really, it never left. It has been revisiting again, again, and again. This is a cyclic attack that...