Website = Web Application (typically)
Tell me about your web applications.
Website = Web Application (typically) Read More »
Tell me about your web applications.
Website = Web Application (typically) Read More »
“Your data’s been compromised, but, please, have this credit monitoring service…”
Please Have This Credit Monitoring Service… Read More »
Nico and Cisco inspire changes in security.
Babies and toddlers do, too.
Fortify Your Kitchen – by Nico and Cisco Read More »
MOVEit CVEs are amassing. To us in the general public, think of CVEs as forensic listings of vulnerabilities in software – details about them, when they were discovered, and what versions of the software they affect.
CVEs, MOVEit, Cl0p, Ransomware. Cybercriminals. Read More »
Two data breaches disclosed this year for an online retailer of specialized goods.
Website currently uses Magento, but there’s no information about either breach originating from the website. I’m sharing the information I have. Still, online retailer, so I’ll call it “likely.”
Data Breach Synopsis – Online Retailer Read More »
34 years ago. 180 – 200 biscuits. My first night of work – June 14, 1989. Business likes metrics, so there you go. A couple o’ hundred biscuits. People rave about specialization for productivity, so there you go again. Biscuit queen for a day. KFC made them from scratch then. I was 16, almost 17 (yes, you can sing that), and I combined buttermilk, biscuit mix, and increasing speed throughout the night. Line the trays,
Tell Me About Your Job History, Heather Read More »
I sat down with Santosh Kamane of CyberFIT to talk about how everyone (each person, each organization) needs cybersecurity and some small things they can do for great impact.
Conversation with Santosh Kamane and Heather Noggle Read More »
After some summer inactivity, it was some weightlifting on Tuesday and a 3-mile run on Wednesday.
Oh, not for me. But I can certainly empathize – and I’m sure you can, too.
Go and Run a 5k (And/Or Consider Cybersecurity) Read More »
It’s every morning – between 7 and 8 local time.
The watering. Shade garden. Vegetable garden. Flower garden.
Water, Water Everywhere Read More »
Privacy laws are popping up like late spring mushrooms around oak trees. Core content and intent is the same, but with slightly differing notification requirements for breach of privacy, which is what a data breach is.
Mushroom Infiltration? Read More »