About Us | Contact Us
View Cart
Archive for 'Programs' Category

The Magnificent Seven 2018

By Dan Hadaway - Last updated: Wednesday, November 22, 2017

Seven trends impacting Information Security Officers of Small Institutions! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Seven trends impacting Information Security Officers of Small Institutions! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance Welcome to the Magnificent Seven, my annual […]


Increasing Complexity Threatens Software Stability

By Vigilize - Last updated: Friday, November 17, 2017

As lines of code continue to replace humans and physical devices, quality control is essential…and often overlooked. An article review. Looking back over the last decade or two it is easy to see how computers have changed physically as they shrank in size, spreading to our pockets and beyond, but another change was going on […]


WPA2 Vulnerable To Attack

By Vigilize - Last updated: Friday, November 10, 2017

While Many Devices Have Already Been Patched, Many More May Never Be… An article review. When does exploit news cross the line into being a trend? How about when it impacts essentially every single wi-fi enabled device? That’s the takeaway from the recently announced vulnerability in the WPA2 wireless security standard, detailed in this TechCrunch […]


Cyber Monday

By Vigilize - Last updated: Friday, November 10, 2017

Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your office.  


Cybersanity in the Incident Response Age

By Jolley | Hadaway - Last updated: Friday, November 3, 2017

Infotex is finally ready to say something about the Equifax Breach, the Ultimate Educational Moment. This Jolley | Hadaway article will explain why we’ve been silent, ’til now!


Security Workers Fired After Defcon Talk

By Vigilize - Last updated: Tuesday, October 31, 2017

Two Salesforce security team members were let go following their presentation of a new testing platform. An article review. Before you join that panel discussion of disgruntled bankers, consider this story that comes to us by way of Joe Cychosz: a pair of Salesforce security team members were let go shortly after their presentation at the […]


Imagine Having Your Audit Reports Published For All The World To See…

By Vigilize - Last updated: Friday, October 20, 2017

Following multiple security incidents, the FDIC has made their audit reports available to the public. An article review. Here in the private sector, we can sometimes take for granted the confidentiality agreements that restrict access to our audit reports and other compliance related information–but what if they were available to any interested parties? That’s exactly […]


Cybercrime

By Vigilize - Last updated: Tuesday, October 10, 2017

Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your office.  


Fitbit Vulnerability Raises Activity Tracker Concerns

By Vigilize - Last updated: Monday, October 2, 2017

Data from the devices could be tied to insurance and healthcare costs in the future… An article review. While we try not to cover “exploit of the week” style articles here (other sites do a far more comprehensive job on that subject!), we thought a recent article on an exploit concerning Fitbit devices stood out […]


Broadcast Awareness

By Dan Hadaway - Last updated: Monday, September 18, 2017

Steps One and Two . . . How to Substantially Decrease (and Streamline) Response Time Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Given that we have been watching networks since 2000, we have seen a LOT of incident responses.  There is a small, […]