Apr 1, 2026
•
4 min read
Consistency is the enemy of the hacker, and the specialty of the machine.
Mar 30, 2026
10 min read
Vishing, the risk of human nature, Iran cyber defense playbook, living on (and protecting) the edge, and an FCC banhammer on foreign routers.
Mar 25, 2026
6 min read
Organization leaders probably don't understand technical cybersecurity jargon, but they do understand money, probability, and business risk.
Mar 23, 2026
Microsoft Intune, tax season phishing, threats to your EDR, buggy IP-KVMs, update UniFi now, and stop running SharePoint on-premises.
Mar 16, 2026
11 min read
Beware of cyber collateral damage from Iran War, use GenAI to augment security for small teams, Microsoft 365 lessons from the field, Windows hotpatching, and Windows Hello passkey support coming.
Mar 11, 2026
5 min read
If your organization takes a punch from a cyberattack, can it stay on its feet and keep fighting?
Mar 9, 2026
9 min read
Many flavors of phish(ing), allow-listing browser extensions, and password managers FTW
Mar 4, 2026
Adversaries don't do just one thing. They have to accomplish a series of things to achieve their goals. Block one of the things, slow and potentially stop the attack.
Mar 2, 2026
AI, What's in a name, AirSnitch wi-fi threat, and... quishing?
Feb 27, 2026
Minimize risk with proactive protection by prioritizing the basic cybersecurity hygiene every organization needs, regardless of the threat.
Feb 23, 2026
7 min read
Getting "played" by email, thwarting cookie theft, data extortion, and newsflash: threat actors are using AI.
Feb 18, 2026
3 min read
The transition from guiding principle to everyday security work requires a clear roadmap. We discuss the difference between strategies and tactics, why strategy comes first, and the five supporting strategies for cybersecurity.
News
Feb 16, 2026
Secure Boot, SCCM... and nslookup?
Feb 13, 2026
A good place to start.