The world awaits...

threat (2)

Thinking about Secure Computing

What do you think about when you hear "secure computing"? You could think about access controls (username/password, two factor authentication, etc), encryption (of data at rest, data in transit), air-gapped networks, physical security of the…

Continue reading...

Threats! Everywhere!

Out of curiosity, I enabled all of the threat detection and reporting systems on my home firewall. As it turns out, the home network is under siege. The firewall is configured to report, but not…

Continue reading...