Wanna Cry? Updating your systems is crucial!

When hacking exploits had been leaked from the NSA last month, it offered a hacking toolkit to anyone in the world who wished to try to use them. The companies responsible for the effected programs, such as Microsoft, had immediately scrambled to update – or had, in fact, already provided updates – to defend against these…

Read More

The Race for Security: Zero Day Exploits

Our networked systems, be they computers, databases, phones, or other devices, are an endless battlefield. Zero-day exploits have been buzzing in the news in the wake of the Wikileaks concerns, where a number of such exploits had been posted where any who were interested could learn illegally about how to use them. Many are worried about…

Read More

The Tax Clock is Ticking

Phishing Scams Thrive on Deadlines and Fear Tax returns are soon due on Tuesday, April 18th, 2017, and with that looming deadline, the pressure is on to have everything done and filed correctly. All paperwork in order? All taxes accounted for? Employees all have their W-2s? It is a pressure that phishing scammers thrive upon.…

Read More

Cybersecurity in the New Administration

2016 has been a year, to say the least. With the loss of legends like David Bowie, Prince, Alan Rickman and Mohammad Alli, and of course a tumultuous presidential election leaving much of the nation divided, we’re just about ready to put this year to bed. However, we still have the better half of December…

Read More

Do You Want to Work in Infosec or Win a Nobel Prize for Literature?

Is This a Resume or a Novel? 5 InfoSec Resume Tips I’ve come to the realization that we have many budding writers masquerading as Information Security professionals out there. Today, my InfoSec staffing company received a fifty-five page resume from a candidate. I’m not joking – 55 pages! In eighteen years of recruiting, this is…

Read More

Cybersecurity is Not Up for Debate

Taking a Look at Cybersecurity’s Future in Legislation With the presidential debates behind us, and the election day looming, the issue of cybersecurity still remains largely untouched. While a passing topic at some point in each of the debates, the only direct question ever addressing the issue was from the first debate. Moderator Lester Holt…

Read More

Recruiters getting spammed!

I know what some of you are thinking, how do you like it now the shoe is on the other foot?  Well I don’t but not only because I don’t like being spammed…. I mean who does?  More because some of the stuff I get is the exact reason why all recruiters get tarred with…

Read More

IT Phone Home

The Challenge of Connecting Mobile Apps to IoT Devices in Homes A challenge for home automation developers is how can something sitting in your home network, which is presumably on a private network behind a firewall hidden from hackers, be readily available to a mobile app which could be potentially anywhere in the world. When you receive the little…

Read More

Someone’s Hacked My Toaster!

IoT Security Hysteria & Some Development Tips to Avoid Being Called Out at Defcon Being in the fairly uncommon position of founding both security and mobile app development companies, I get to play poacher and gamekeeper on a daily basis. For my American friends, that’s offense and defense! I wanted to add a little value from…

Read More

Kickstart your Career in InfoSec with the Peerlyst Guide

Cyber security is one of the fastest growing job markets in the world today, though newcomers can find breaking into the field a difficult feat. Yet, with Forbes reporting a growth of over $90 billion in the next four years, there seems to be no time like the present to make a career switch. Thanks to…

Read More