Cyber Defense Advisors

News

Data capture by border agencies can and will happen – are your on-the-road employees prepared?

Does your company have a travel policy that instructs and supports employees traveling internationally for business with direction regarding comportment and cooperation? This isn’t a trick question. To have a travel program that provides employees with anticipated scenarios, and to provide them with unique devices for international travel, is a significant investment of resources both […]

Cyber News, Cyber Threat Trends

Russia Suspected in Truss Phone Hacking Scandal

One year’s worth of messages reportedly downloaded from former PM’s device

Cyber News, Cyber Threat Trends

Twilio reveals hackers compromised its systems a month earlier than previously thought

Cloud communications firm Twilio reveals that it fell victim to a voice phishing attack in June 2022, allowing hackers to access customer contact information.

Cyber News, Cyber Threat Trends

Attention business owners: Top 5 Cybersecurity questions to ask in 2022

Wayne Bridgeman II, a Senior Manager on AT&T’s Network Cybersecurity team, offers a 5-point checklist for businesses in 2022 alongside tidbits of often overlooked tactics that can strengthen security. Wayne Bridgeman II is no stranger to the fighting ring. He fought professionally in the martial arts community for 5 years and has since transitioned to helping […]

Cyber News, Cyber Threat Trends

Less Is More: Why One Antivirus Software Is All You Need

Personal devices and the information they carry are incredibly valuable to their owners. It is only natural to want to protect your device like a royal family fortifying a medieval castle. Unlike medieval castles that depended upon layers and layers of protection (moats, drawbridges, spiky gates, etc.), personal devices thrive on just one defense: a devoted guard called antivirus software.   Increasing your personal device’s […]

Cyber News, Cyber Threat Trends
  • by
  • October 31, 2022

AWS CloudFormation Policy Document Error Messages Could Be Nicer

Telling me I have an invalid policy document with no further information is not helpful — and the errors in this post seem like they would be easy to pass through I was just getting some errors with a policy document for a VPC Endpoint. The error messages are simply this: InvalidPolicyDocument (Service: AmazonEC2; Status Code: 400; Error Code: […]

Cyber News, Cyber Threat Trends
  • by
  • October 30, 2022

Deleting CloudFormation resources with IAM and Resource Policy Dependencies

ACM.96 Gotchas when trying to create zero-trust policies and then later deleting and recreating the policies This is a continuation of my series of posts on Automating Cybersecurity Metrics. Dependencies between CloudFormation stacks What happened when I tried to delete some stacks is that I could not delete them because other CloudFormation stacks reference that stack. […]

Cyber News, Cyber Threat Trends
  • by
  • October 29, 2022

Deleting CloudFormation Stacks

ACM.95 Creating a script to delete a stack of resources so you can redeploy from scratch This is a continuation of my series on Automating Cybersecurity Metrics. Deleting stacks might not be as easy as you think! As I explained in the last post, my resources got into a mangled state in CloudFormation I couldn’t fix […]

Cyber News, Cyber Threat Trends
  • by
  • October 29, 2022

A Risk Assessment style most CISOs have never seen

Seldomly seen but nice to have Continue reading on The CISO Den »

Cyber News, Cyber Threat Trends