All Stories

Achieving anonymity and what defines it part 4

This article is a re-edition of a chapter of Panopticism Ex Machina: Practical ways to obtain anonymity, confidentiality of data and repudiability of actions on the internet and why it...

Why cybersecurity incident response is critical for any company

It is nothing special to hear about a cybersecurity incident; cybersecurity has become one of the most important aspects of any company that has IT systems.

What is Endpoint Security?

An endpoint is any device that connects to the network such as laptops, desktops, tablets, IoT devices, smartphones, servers, workstations, printers, etc. These serve as the entry points for many...

Achieving anonymity and what defines it part 3

This article is a re-edition of a chapter of Panopticism Ex Machina: Practical ways to obtain anonymity, confidentiality of data and repudiability of actions on the internet and why it...

Microsoft Security Update August 2021

A smaller patch this month, with fixes for 44 CVEs. But don’t let your guard down as Microsoft reported 2 publicly known vulnerabilities and even 1 that is currently being...

BCMS4: BIA is not a Risk Assessment

One of the most common but critical misconceptions around Business Continuity Management is confusion of Business Impact Analysis (BIA) with Risk Assessment. Both are key elements of the Business Continuity...