In this week’s episode, we will dig into the risk benefit analysis of allowing kernel level access to third party application. We will look into the inherent risks this brings into the operating system and the benefit thereof.We will also...
This week’s episode needs very little introduction: The CrowdStrike IT Outage.We will delve into the unprecedented IT outage caused by a corrupt update from CrowdStrike, which led to widespread Blue Screen of Death (BSOD) errors on Windows...
180 -Unmasking Data Breaches – Understanding the Surge and Examining Recent Major Incidents – Part 2
As I said in part of this two part series episode, It’s easy to feel like nothing is secure these days, with constant reports of data breaches and exploits occurring everywhere you look. From major corporations to small businesses, no one...
179 -Unmasking Data Breaches – Understanding the Surge and Examining Recent Major Incidents – Part 1
It’s easy to feel like nothing is secure these days, with constant reports of data breaches and exploits occurring everywhere you look. From major corporations to small businesses, no one seems immune to these pervasive cyber threats. The...

