April 2020

Google Apple Partnership to track Corona Virus infections

After its release, a vulnerability will be identified that threat actors will exploit and have a field day. This might end up being a privacy nightmare.   If this initiative still proceeds, which it will, thanks to folks with an attention span of a goldfish, the following requirements MUST be included

Cyber Security News for 9Apr2020

“We all know there are a number of different security devices that need to be continually monitored because they represent attack vectors. That’s why understanding configuration management is critical to security hygiene. As practitioners, we need to adhere to CIS controls as they provide a critical baseline for maintaining our security framework and keeping up our integrity monitoring processes.” …

Cyber Security News for 9Apr2020 Read More »