InfoSec Musings

Tuesday, 12 September 2017

Cloud Access Security Broker (CASB) - The purpose of a forward proxy

›
First of several short articles on the feature sets of a typical Cloud Access Security Broker (CASB) The Forward Proxy: In a Cloud Acce...
Thursday, 24 August 2017

Can our Managed SIEM providers please get their heads out of the 90's?

›
rant mode on    (I had tried standard <> tags, and the CMS tried to process them!  LOL)   I've been a customer of SIEM (Sec...
Thursday, 29 June 2017

Canada 150, and Canadian Innovation.

›
Canada has a long legacy of innovation and prosperity. We have blazed technology trails in every aspect of life, from agriculture to medi...
Tuesday, 27 September 2016

6 steps to protect yourself from the Yahoo email breach!

›
Last Thursday (09'22'16), Yahoo admitted to the largest email provider breach in history. The breach, which happened in 2014,  ...
1 comment:
Tuesday, 12 July 2016

Turmoil in the CASB market - 2016 the year of Big Business Acceptance

›
In April of last year, I wrote a technical comparison of the various players in the CASB (Cloud Access Security Broker) space , and had suc...
Tuesday, 21 June 2016

Threat Modeling a Mobile Application

›
The purpose of this article is to provide security guidance in the development of mobile applications.  The following application threat-mod...
›
Home
View web version

About Me

security-musings
View my complete profile
Powered by Blogger.