Port of Seattle August data breach impacted 90,000 people
05
Apr
2025

Port of Seattle August data breach impacted 90,000 people

Port of Seattle August data breach impacted 90,000 people Pierluigi Paganini April 05, 2025 Port of Seattle is notifying 90,000…

A Real Solution To The Israeli/Palestinian Conflict
05
Apr
2025

A Real Solution To The Israeli/Palestinian Conflict

February 5, 2007 I’ve been thinking about this issue heavily for over a decade (since going to the Middle East…

Microsoft Celebrates 50th Anniversary!
05
Apr
2025

Microsoft Celebrates 50th Anniversary!

Microsoft celebrated its 50th anniversary on April 4, 2025, reflecting on its journey since Bill Gates and Paul Allen founded…

Liberals and Conservatives: An Amazingly Accurate Oversimplification
05
Apr
2025

Liberals and Conservatives: An Amazingly Accurate Oversimplification

Simply stated, liberals have a better vision of what the world should look like, but are generally incapable of developing…

CISA Adds Actively Exploits Ivanti Connect Secure Vulnerability in Known Exploited Catalog
05
Apr
2025

CISA Adds Actively Exploits Ivanti Connect Secure Vulnerability in Known Exploited Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-22457, a critical vulnerability in Ivanti Connect Secure, Policy Secure,…

Security: How Network Ports Work
05
Apr
2025

Security: How Network Ports Work

Many who are new to networking and security wonder what it means to have “ports” open on your computer. Some…

Sec-Gemini v1 - Google Released a New AI Model for Cybersecurity
05
Apr
2025

Sec-Gemini v1 – Google Released a New AI Model for Cybersecurity

Google has made a big move to fight cyber threats by announcing Sec-Gemini v1, an experimental AI model designed to…

Jane Devry
05
Apr
2025

Securely Deploying and Running Multiple Tenants on Kubernetes

Kubernetes has become the backbone of modern cloud native applications, and as adoption grows, organizations increasingly seek to consolidate workloads…

Security: Implementing A Secure And Usable Internet Password Scheme
05
Apr
2025

Security: Implementing A Secure And Usable Internet Password Scheme

Being an information security consultant I am often asked how to balance the need for online passwords that are both…

"IngressNightmare" Critical RCE Vulnerabilities in Kubernetes NGINX Clusters Let Attackers Gain Full Control
05
Apr
2025

“IngressNightmare” Critical RCE Vulnerabilities in Kubernetes NGINX Clusters Let Attackers Gain Full Control

A recently discovered set of vulnerabilities, dubbed “IngressNightmare,” found in Ingress NGINX Controller, exposing clusters to unauthenticated remote code execution…

Free Will: The Necessary Delusion
05
Apr
2025

Free Will: The Necessary Delusion

One of the more interesting sub-debates associated with Atheism vs. Religion is that of free will. Quite simply, many Atheists…

Vista’s Security Hobbled By Microsoft’s Own Insecure Past
05
Apr
2025

Vista’s Security Hobbled By Microsoft’s Own Insecure Past

Yesterday I wrote about Joanna Rutkowska’s work that highlighted a serious security flaw in Windows Vista. Her finding was that…