09 Dec Network Security Why the Latest Raspberry Pi CVE is (Almost) Completely Bogus December 9, 2021 By Mike Gargiullo 0 comments Twitter and various InfoSec outlets just blew up over a CVE (Common Vulnerabilities and Exposures) database entry CVE-2...Continue reading
21 Oct Application Security Two-Factor Authentication and the New OWASP ASVS 4.0 October 21, 2019 By Mike Gargiullo 0 comments The OWASP Application Security Verification Standard (ASVS) Version 4 updates and extends the previous ASVS 3 release. We’ve been usin...Continue reading
06 Nov ISMS Consulting 3 Reasons Why “Project Verify” Scares Me November 6, 2018 By Mike Gargiullo 0 comments A media buzz is building around an initiative by the “big 4” US mobile phone carriers (AT&T, Verizon, Sprint, T-Mobile) to replace ...Continue reading
19 Jul ISMS Consulting EKG Device Hacks Underscore Growing IoT Risks in Healthcare July 19, 2018 By Mike Gargiullo 0 comments The US Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team, ICS-CERT, just published a medical d...Continue reading
25 Apr InfoSec Strategies Why Cryptocurrency Mining Malware is Targeting Corporate Networks—and Why You Should Care April 25, 2018 By Mike Gargiullo 0 comments A number of threat researchers are now reporting a massive and sustained spike of almost 500% in the volume of illicit cryptocurrency m...Continue reading