| EvL Consulting | https://erwinvanlonden.net |
| Gravatar | https://en.gravatar.com/evlonden |
| EvL Consulting | https://erwinvanlonden.net |
| Gravatar | https://en.gravatar.com/evlonden |
CISA is warning that its Chemical Security Assessment Tool (CSAT) environment was breached in January after hackers deployed a webshell on its Ivanti device, potentially exposing sensitive security assessments and plans.
CISA is warning that its Chemical Security Assessment Tool (CSAT) environment was breached in January after hackers deployed a webshell on its Ivanti device, potentially exposing sensitive security assessments and plans.
A mishandled GitHub token gave unrestricted access to Mercedes-Benz's internal GitHub Enterprise Service, exposing source code to the public.
In an age of escalating cyber threats, safeguarding your organization’s sensitive data is no longer optional—it’s imperative. We’re thrilled to unveil an extraordinary partnership that marries unbeatable affordability with top-tier security. EvL Consulting has joined forces with Keeper, a trailblazer in password and identity management, to introduce a game-changing Managed Service Provider (MSP) solution. This…Continue reading →
Food for thought. Isn't Microsoft Defender for O365 a self-sustainable entity driven by flaws created in their own organisation? I mean, if they would re-assign the people and resources that now create Defender, to O365, we would end up with a secure and better product.
That being said, it would eat into the revenue stream of said company which is bad for the NASDAC listings....
I wonder what governments would say if car manufactures would create such crap vehicles, that customers would require a premium maintenance contract, just to keep their car on the road. I guess all hell would break loose.
Introduction:In an increasingly interconnected world, safeguarding our digital lives has become paramount. One of the fundamental pillars of online security is the strength of our passwords. In this article, we will explore the characteristics of a robust password, the importance of techniques such as PBKDF2, hashing, and salt, and the advantages of using a password…Continue reading →
Multifactor authentication (MFA) is an essential security measure that adds another layer of protection to user accounts and systems. There are several methods used for MFA, including SMS, push notifications, phone apps, and hardware tokens. Each of these methods has its own set of pros and cons. However, hardware tokens offer distinct security benefits over…Continue reading →
In today's digital landscape, small and medium-sized businesses (SMBs) face increasing cybersecurity risks that can have detrimental effects on their operations, finances, and reputation. To effectively protect their sensitive data and systems from cyber threats, SMBs must conduct comprehensive cybersecurity risk assessments.