Access and Feeds

Blog Archives

Security: Celebrating 9 Years of World Password Day

By Dick Weisinger

The first Thursday in May is World Password Day. In 2022 it falls on May 5th and this is the 9th year of existence since first being celebrated in 2013. The idea for setting aside a day focused on thinking

Security As Code: Shifting Away from Siloed Software Development

By Dick Weisinger

The cloud has sped up developer cycles and the ability to deploy new software. Application security is easy to configure too, but sometimes it’s too easy. It’s during this step where security configuration mistakes are often made and security vulnerabilities

Security: Hackers Exploit Kubernetes Misconfigurations, but also Use it as a Tool to Scale Their Attacks

By Dick Weisinger

Software misconfiguration is one of the easiest ways that a hacker can exploit software, and unfortunately, misconfiguration problems are common. One study found that more than 80 percent of systems were vulnerable because of misconfiguration problems — firewall, web server,

Data Poisoning: Machine Learning Susceptible to Manipulation by Hackers

By Dick Weisinger

Data poisoning is the alteration or manipulation of Machine Language (ML) training data. While the amount of data changed may be small, it may be enough to both avoid detection and to bias the algorithm into favoring a particular result.

Cybersecurity Burnout: Mental Health Suffers from Unrelenting Attacks

By Dick Weisinger

A job in cybersecurity offers one of the top paychecks in IT. But the flip side of the job is that it can be incredibly demanding, stressful, and a job where a significant number of people suffer burnout. A study