top of page
Search


Why Attack Surface Assessments Are Critical to Modern Cybersecurity
Introduction In today’s threat landscape, organizations face a constant barrage of cyber threats targeting both internal and external...

derekdodds
6 days ago3 min read
Â
Â
Â


Redefining Network Segmentation for the Zero Trust Era: Dispatching with the Square Onion
Introduction For decades, network architects have built security using a model that I like to refer to as the square onion, layer upon...

derekdodds
Jun 284 min read
Â
Â
Â


Password Managers: Essential Security Tool or Single Point of Failure?
Password requirements: 8 characters, one symbol, a haiku, and the blood of a unicorn. Okay, maybe not the last two, but passwords always...

derekdodds
Jun 193 min read
Â
Â
Â


Selecting the Right Cybersecurity Framework for Your Business - Navigating NIST, ISO 27001, CyberSecure Canada, and More
As cyber threats continue to evolve, businesses of all sizes face increasing pressure to strengthen their security posture. The journey...

derekdodds
Jun 104 min read
Â
Â
Â


The Hidden Dangers of Unrestricted Teams Federation: A Spear Phishing Playbook
In today’s fast-paced digital workplace, collaboration is key. Tools like Microsoft Teams make it easy for organizations to communicate...

derekdodds
May 272 min read
Â
Â
Â


Cybersecurity Challenges for Small & Medium Businesses and How to Overcome Them
In today’s digital world, small and medium businesses are under increasing pressure to strengthen their cybersecurity posture. While...

derekdodds
May 263 min read
Â
Â
Â


Protecting Legacy OT Systems: Why Segmentation and Governance Are Critical to Business Continuity
In an era where digital transformation is reshaping how businesses operate, Operational Technology (OT) environments remain a crucial,...

derekdodds
May 203 min read
Â
Â
Â


Forecasting Software Risks in Critical Infrastructure by 2040
I was fortunate to catch Dr Charles Weir’s presentation at NCSS2025 in April. A collaborative study by Lancaster University and the...

derekdodds
May 121 min read
Â
Â
Â


Palo Alto Auth Key Exceeds 80 Characters
I ran into an interesting feature this week while provisioning 4 PA-440's. The Panorama generated auth key was over 80 characters long...

derekdodds
Jan 19, 20221 min read
Â
Â
Â


Have you tested restoring the backups?
I'm just going to come out and say it, if you have not tested it then you can't depend on it. Backup Testing We put in a lot of effort to...

derekdodds
Jan 6, 20221 min read
Â
Â
Â


Log4j Risk Remains High
While we patch our vulnerable public facing servers we must not forget about our internal ones. Attackers are actively exploiting...

derekdodds
Jan 6, 20221 min read
Â
Â
Â


How to reduce ransomware risk : Part 1
Ransomware is an ongoing concern for everyone doing business on the internet. Threats evolve daily and we need to ensure we are...

derekdodds
Oct 8, 20211 min read
Â
Â
Â
bottom of page