Asset Management

The Voice Clone Debate

Likelihood of AI in pretexting? The critical impact of artificial intelligence. Another one of those Dan's New Leaf Posts, meant to inspire thought about IT Governance . . . . ...

The Four Basic Truths of System Security

System Security and Cybersecurity are not the same thing. . . Another one of those Dan's New Leaf Posts, meant to inspire thought about IT Governance . . . . ...

What’s In A Name?

A trick I learned in the ’80’s . . . Probably saved me . . . and the teams I served . . . thousands of hours! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Naming goals and projects is a basic practic...

The Changing IT Landscape and Endpoint Detection and Response (EDR)

Threats are changing, EDR can help us adapt . . . Today’s advanced persistent threat (APT) understands that the IT landscape has changed. In the post-COVID age, more and more organizations have adopted some form of work from home.  While WFH offers many convenience...

Managing Software Supply Chain Risk

Software Bill of Materials (SBOMs) are becoming more and more important. . . We are all very familiar with one aspect of the software supply chain – updates.  New features, bug fixes, and performance upgrades are a regular occurrence to any device’s lifecycl...

Zeroing in on VPN Security

Has the security effectiveness of VPNs passed? Another Technical Article by Tanvee Dhir! Why under scrutiny? VPNs (Virtual Private Networks) have been a cardinal piece for secure internet browsing for decades. They offer a secure and encrypted tunnel to transfer your d...

New Chinese Law Highlights Disclosure Debate

Questions about China’s new disclosure laws only highlight the uncertainty about disclosure in general… An article review. China recently made waves in the security world by announcing a new set of data security laws, one of which has added new fuel to a lo...

A Network is a Network . . . NOT!

Four Conditions … …For Why a Network Can be Anything But a Network! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . I have to admit that infotex is being called into engineering meetings with larger orga...

Pegasus Making You Mega-Sus?

If Zero days need Zero clicks, are there any secure devices in the mix? Tanvee Dhir explores the Pegasus spyware. Another technical post, meant to inspire thought about IT Governance . . . . Introduction Over the past couple of weeks, we have seen multiple stories reg...