Microsoft Celebrates 50th Anniversary!
05
Apr
2025

Microsoft Celebrates 50th Anniversary!

Microsoft celebrated its 50th anniversary on April 4, 2025, reflecting on its journey since Bill Gates and Paul Allen founded…

Liberals and Conservatives: An Amazingly Accurate Oversimplification
05
Apr
2025

Liberals and Conservatives: An Amazingly Accurate Oversimplification

Simply stated, liberals have a better vision of what the world should look like, but are generally incapable of developing…

CISA Adds Actively Exploits Ivanti Connect Secure Vulnerability in Known Exploited Catalog
05
Apr
2025

CISA Adds Actively Exploits Ivanti Connect Secure Vulnerability in Known Exploited Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-22457, a critical vulnerability in Ivanti Connect Secure, Policy Secure,…

Security: How Network Ports Work
05
Apr
2025

Security: How Network Ports Work

Many who are new to networking and security wonder what it means to have “ports” open on your computer. Some…

Sec-Gemini v1 - Google Released a New AI Model for Cybersecurity
05
Apr
2025

Sec-Gemini v1 – Google Released a New AI Model for Cybersecurity

Google has made a big move to fight cyber threats by announcing Sec-Gemini v1, an experimental AI model designed to…

Jane Devry
05
Apr
2025

Securely Deploying and Running Multiple Tenants on Kubernetes

Kubernetes has become the backbone of modern cloud native applications, and as adoption grows, organizations increasingly seek to consolidate workloads…

Security: Implementing A Secure And Usable Internet Password Scheme
05
Apr
2025

Security: Implementing A Secure And Usable Internet Password Scheme

Being an information security consultant I am often asked how to balance the need for online passwords that are both…

"IngressNightmare" Critical RCE Vulnerabilities in Kubernetes NGINX Clusters Let Attackers Gain Full Control
05
Apr
2025

“IngressNightmare” Critical RCE Vulnerabilities in Kubernetes NGINX Clusters Let Attackers Gain Full Control

A recently discovered set of vulnerabilities, dubbed “IngressNightmare,” found in Ingress NGINX Controller, exposing clusters to unauthenticated remote code execution…

Free Will: The Necessary Delusion
05
Apr
2025

Free Will: The Necessary Delusion

One of the more interesting sub-debates associated with Atheism vs. Religion is that of free will. Quite simply, many Atheists…

Vista’s Security Hobbled By Microsoft’s Own Insecure Past
05
Apr
2025

Vista’s Security Hobbled By Microsoft’s Own Insecure Past

Yesterday I wrote about Joanna Rutkowska’s work that highlighted a serious security flaw in Windows Vista. Her finding was that…

Jane Devry
05
Apr
2025

Don’t Wait for The Next IT Audit To Address High-Risk Threats

Too Many Organizations Look to Scheduled Audits to Dictate Patching Efforts Though it may seem obvious that patches to critical…

Rolex: It’s Not What You Think
05
Apr
2025

Rolex: It’s Not What You Think

Since getting my watch I’ve received some pretty interesting reactions from people. The biggest misconception people seem to have about…