Governance, Risk and Compliance
Do you have the resources and processes in place to document policies, procedures, and due diligence? How much security is enough? How...
Addressing CISA's Response to COVID
The Cybersecurity and Infrastructure Security Agency (CISA), is the nation’s risk advisor for the Nation responsible for improving cyber...
STEAM Student of the Month Nominations
Key Cyber Solutions (KCS) is accepting nominations for STEAM Student of the Month! Do you know of a High School or College student who is...
Active Directory Exploitation Part 2 - LLMNR/NBT-NS Poisoning
Disclaimer: Do not perform anything listed below unless you are a certified/hired penetration tester with proper written authorization...
Top Cybersecurity Firm Hacked
FireEye, on of the largest U.S based cybersecurity firms, with more than 3,000 employees and revenues exceeding $800M in 2019, disclosed...
Active Directory Exploitation Part 1 - First, The Basics
Today, I'm going to start writing a quick blog series that explores Active Directory, implementation, and most importantly, how it is...
Federal Health IT Strategic Plan for 2020-2025 Released
The U.S. Department of Health & Human Services (HHS) recently published the final 2020-2025 Health IT Strategic Plan which was developed...
Key Cyber Solutions at Tech Warrior Cyber Ops 2020 - IoT Enumeration
What is it like to participate in a hacking challenge hosted by the Air Force? It's incredibly fun and exciting and I wanted to share our...
Frequently asked questions about Mobile App Development
It's inevitable. Having been involved in technology for almost 20 years, I often get asked questions, from various social circles,...
Zoom vs. Google Meet - From an Ethical Hacker's Perspective, Which is More Secure? (It's Google)
Before jumping into this, for security reasons detailed below (and because nobody likes click-bait), I'm just going to tell you...