Thomas JreigeOct 5, 20222 minCyber SecurityHacked... Hacked... Hacked... Oh My!Two (2) major telecommunication companies and a major hotel compromised.
Thomas JreigeSep 21, 20222 minCyber SecurityProduct Integrity and Authenticity - Sounds Difficult!Integrity and Authenticity of hardware and software is noble. But if you don't have a security budget, how do you do this?
Thomas JreigeSep 16, 20222 minCyber SecurityPrinters - Delivering bad newsPrinters, technology of the past or a delivery mechanism for ransomware warnings?
Thomas JreigeSep 12, 20223 minDisaster RecoveryPart 4 of 4 — A CYBER CERBERUS CASE STUDY — Disaster recovery in Critical/Sensitive Operations.In 2016, the Auditor General found that 64% of audited agencies in the Western Australian public sector did not have adequate disaster...