Security

Spring is traditionally the time when we de-clutter.  Purging all of the stuff we just don’t need is spiritually satisfying, and it also serves as a reminder of what’s truly important to us. The healthy feeling you get from spring cleaning can extend to the technology side...

As long as there has been an internet, there have been internet scams and cybersecurity incidents.  As long as there has been a tax system, there has been tax fraud of one sort or another.  In a way, it’s surprising that it took so long for these...

It’s well known that prevention is the most effective and least costly form of cybersecurity.  Once a breach happens, it can be very difficult to get back to “normal”, if such a thing even exists anymore.  Better to augment that “normal” state with the most robust defense...

When hackers strike, it’s never pretty.  Businesses are disrupted, customers lose faith, the brand suffers.  And when it happens more than once, I.T. departments (and their superiors) start to ask more pointed questions.  The issue shifts from “why did this happen?” to “what can we do to stop...

On March 1, a group of researchers working in academia and the tech sector released news that over a third of the servers on the internet are susceptible to having their secure traffic decrypted were it to be intercepted.  Welcome to CVE-2016-0800, the DROWN attack. Anyone who’s been...

Scale Venture Partners was bogged down in the morass of cybersecurity.  Like most companies today, they use a lot of different systems.  As the layers of technology increased, so did the complexity of their security challenge.  Additionally, their users were increasingly mobile, compounding the difficulty of keeping every...