by Cody Jackson | Feb 14, 2019 | Aquila inSecurity
Cybersecurity is an ever-increasing and advancing arms race. The attackers and threat actors are constantly harnessing new technology and techniques to increase their return on investment. As the defenders of our corporate, public, and private networks, we must do the...
by Cody Jackson | Feb 6, 2019 | Aquila inSecurity
APIs (Application Programming Interface) have become an increasingly important tool in IT. As businesses have become more reliant on connecting their business applications with each other and third-party tools a weak point has emerged in IT infrastructure. An...
by Stephen Crim | Jan 30, 2019 | Aquila inSecurity
Armis Breaks Down Vulnerabilities in the Internet of Things IoT (Internet of Things) has been the buzzword in security for the last 18 months. There have been a number of high-visibility breaches that were orchestrated because of them (one involving a wifi-connected...
by Stephen Crim | Jan 22, 2019 | Aquila inSecurity
Checkpoint Research Details Flaw in Fortnite SSO The Checkpoint blog reveals a great breakdown of a flaw in the SSO infrastructure used by the game Fortnite. SSO and other federated authentication platforms can be a double-edged sword. Developing any...
by Stephen Crim | Sep 24, 2018 | Aquila inSecurity
This post is going to switch back and forth a few times between two issues that plague enterprises as they grow: user credential re-use and administrative password management. Frequently, the bad credential hygiene of a small enterprise will stick around well into...