SECURITY
XAM
We need better systems for vulnerability management
The systems in place to manage software vulnerabilities are often overwhelming and ineffective. But …
Continue readingThe systems in place to manage software vulnerabilities are often overwhelming and ineffective. But …
Continue readingTraditional cybersecurity practices often work to obstruct users rather than help them. In this …
Continue readingOver the past few decades, securing remote access has become monumentally more complex. Remote work, …
Continue readingIn this article, we discuss how admins can programmatically access Spotlight using a utility called …
Continue readingIn this blog, we summarize the results of a fall 2022 survey of IT, helpdesk, and security …
Continue readingIn this article, we compare the various difficulties and costs associated with trying to build your …
Continue reading