InfoSec Musings
Tuesday 12 September 2017
Cloud Access Security Broker (CASB) - The purpose of a forward proxy
›
First of several short articles on the feature sets of a typical Cloud Access Security Broker (CASB) The Forward Proxy: In a Cloud Acce...
Thursday 24 August 2017
Can our Managed SIEM providers please get their heads out of the 90's?
›
rant mode on (I had tried standard <> tags, and the CMS tried to process them! LOL) I've been a customer of SIEM (Sec...
Thursday 29 June 2017
Canada 150, and Canadian Innovation.
›
Canada has a long legacy of innovation and prosperity. We have blazed technology trails in every aspect of life, from agriculture to medi...
Tuesday 27 September 2016
6 steps to protect yourself from the Yahoo email breach!
›
Last Thursday (09'22'16), Yahoo admitted to the largest email provider breach in history. The breach, which happened in 2014, ...
1 comment:
Tuesday 12 July 2016
Turmoil in the CASB market - 2016 the year of Big Business Acceptance
›
In April of last year, I wrote a technical comparison of the various players in the CASB (Cloud Access Security Broker) space , and had suc...
Tuesday 21 June 2016
Threat Modeling a Mobile Application
›
The purpose of this article is to provide security guidance in the development of mobile applications. The following application threat-mod...
›
Home
View web version