Do. Learn. Teach.

-
Well Timed or Coincidental, Cue the Phishing Attacks as 2.5M Students Affected by Data Breach
Read more: Well Timed or Coincidental, Cue the Phishing Attacks as 2.5M Students Affected by Data BreachDays after announcing student loan forgiveness in the United States, 2.5 million student borrowers had their personal information exposed in a data breach and are at an increased risk of being targeted in a phishing attack.
-
Protecting Against the OWASP Top 10 Web Application Vulnerabilities
Read more: Protecting Against the OWASP Top 10 Web Application VulnerabilitiesThe OWASP Top 10 is a standard awareness document that outlines the most critical web application security risks and vulnerabilities. Learn how Agilicus AnyX is designed to eliminate an attacker’s visibility into the potential OWASP Top 10 web application vulnerabilities.
-
Agilicus and Operational Technology
Read more: Agilicus and Operational TechnologyZero Trust Network Architecture can effectively meet the growing demand for enhanced cyber security in industrial and operational technology.
-
Industrial Air Gap – A Tale Of 2 Users
Read more: Industrial Air Gap – A Tale Of 2 UsersDevices on industrial control system networks are ill-equipped for the hardships associated with the Internet and remote access. Low-speed processors, infrequent firmware upgrades, spotty security research, Common Vulnerabilities and Exposures (CVE) publishing, etc. This leads to a natural conflict: the operator is responsible for the security, and they are not willing to sacrifice security for…
-
570 News Agilicus Interview
Read more: 570 News Agilicus InterviewInterviewed on 570 News Tech Spotlight. listen to the interview here, I talk through some of the simple risks and how we help. And a bear joke.
-
Agilicus Awarded Government of Canada Contract
Read more: Agilicus Awarded Government of Canada ContractWe are pleased to announce that Agilicus has been awarded a Government of Canada Contract with Shared Services Canada (SSC). The feedback and interaction we receive from such a marquis customer on our Any X Zero Trust platform is very valuable to us, and great validation of our ideas and technology.
-
Chewy Centre Protected By A Sponge
Read more: Chewy Centre Protected By A SpongeThe M&M is not a good network design: chewy centre, hard shell. Recent cisco router vulnerabilities discussed for defense in depth.
-
Agilicus Recognised as a Top 100 Tech Company to Watch in 2022
Read more: Agilicus Recognised as a Top 100 Tech Company to Watch in 2022We are incredibly excited to announce that Agilicus has been included in the FoundersBeta Top 100 Tech Companies to Follow in 2022. Every year FoundersBeta compiles their list of the […]
-
Top 5 Cybersecurity Resolutions to Cross off Your List in 2022
Read more: Top 5 Cybersecurity Resolutions to Cross off Your List in 2022Cybercriminals had a record year, the cost of a breach reached new highs in 2021. With clear cybersecurity goals, businesses avoid becoming a news headline.
-
NIST sp 800-63A: Introduce Yourself
Read more: NIST sp 800-63A: Introduce YourselfWho are you? Identity involves knowing who you are, and then later proving it. NIST sp 800-63A enrollment is the first step, let’s talk about that!
-
NIST sp 800-63B: How Well Do I Know You?
Read more: NIST sp 800-63B: How Well Do I Know You?Zero-Trust Network Architecture has 3 steps: Authenticate (Who), Authorise(What), Access(How). 3 Levels of strength of the who are defined in NIST sp 800-63B. Does the goldilocks principle apply to you? Read on!
-
Log4Shell – Not Even the Smart Thermostat is Safe
Read more: Log4Shell – Not Even the Smart Thermostat is SafeIgnoring systems that may be deemed ‘unimportant’ in comparison to your revenue-generating technology stack will leave your organization open to compromise from the Log4Shell vulnerability.
-
A Little Consequences Go A Long Way: Return Of The Bear Joke
Read more: A Little Consequences Go A Long Way: Return Of The Bear JokeTwo hikers see a bear. One bends over to tie shoes. Other says, you can’t out run a bear. First says, just need to outrun you. Pause laughter
-
Fake It Till You Make It: Canadian Bank Multi-Factor Authentication Edition
Read more: Fake It Till You Make It: Canadian Bank Multi-Factor Authentication EditionA big 5 Canadian bank has a fake multi-factor authentication sytem, allowing anyone to fall back to password. Why? How is this acceptable?
-
The Economic Cost Of Not Having Multi-Factor: MSP Lawsuit Edition
Read more: The Economic Cost Of Not Having Multi-Factor: MSP Lawsuit EditionManaged Service Provider Breached. Customer pays out. Who is at fault? Lawsuit to determine. Multi-factor authentication to prevent.
-
Agilicus In The News: Kitchener cybersecurity firm makes remote work access simple, secure
Read more: Agilicus In The News: Kitchener cybersecurity firm makes remote work access simple, secureThe Record published an article today on Agilicus. It covers the back-story on what we have set out to accomplish
-
Tech Spotlight: An Impromptu Interview
Read more: Tech Spotlight: An Impromptu InterviewInterview w/ CityNews 570. Hear the origin story of Usenet in my life, and the plan to buy Doritos. And don’t call me old, I’m experienced!
-
Cyber-Security For Thee But Not For Me
Read more: Cyber-Security For Thee But Not For MeHow some public sector entities have great cyber-awareness training, but exempt the elected and senior staff. From Great To Good in one step.
-
Minimum Viable Secure Product
Read more: Minimum Viable Secure ProductA simple set of controls for a Minimum Viable Secure Product. Open source for us all to use. Implement, ask in RFP, common baseline to follow
-
Telnet In Canada: Why?
Read more: Telnet In Canada: Why?Telnet. 40 years old, not fit for purpose. Alive and well in Canada. No amount of mitigation or multi-factor authentication makes it OK.
-
Multi-Factor Authentication And The Supply Chain
Read more: Multi-Factor Authentication And The Supply ChainA high(ish) profile nodejs library is compromised. No multi-factor authentication used by developer. The ripples are far and wide. Including you!
-
The Personal Verification Question: Password’s Dumb Cousin
Read more: The Personal Verification Question: Password’s Dumb CousinThe personal verification question. The dumb, slow cousin of the password. Stored in plaintext, findable in social media. Not multi-factor auth
-
Syniverse Hack, Multi-Factor Authentication, Who Cares? You Should!
Read more: Syniverse Hack, Multi-Factor Authentication, Who Cares? You Should!This article discusses SMS as a second factor for multi-factor authentication in context with the Syniverse hack.
-
I AM. I HAVE. I KNOW. Multi-Factor Authentication
Read more: I AM. I HAVE. I KNOW. Multi-Factor AuthenticationI AM. I HAVE. I KNOW. The trifecta of simple and secure. Why does it improve security so much? Because the factors are not correlated. Use at least 2.
-
Agilicus Named CIX Top 20 ‘Canada’s Most Innovative Companies’
Read more: Agilicus Named CIX Top 20 ‘Canada’s Most Innovative Companies’Agilicus, a leader in Zero Trust Network Access, solutions is named one of Canada’s most innovative technology companies by CIX Top 20 Early annual award.
-
Zero-Trust Remote Access to Fix VoIP DDoS
Read more: Zero-Trust Remote Access to Fix VoIP DDoSReconfigure a VoIP PSTN gateway remotely via Zero Trust with Multi-Factor Authentication and single-sign-on to avoid a DDoS.
-
Add multi-factor authentication to old applications
Read more: Add multi-factor authentication to old applicationsYour cyber insurance is up for review. IGet all applications authenticated with multi-factor, simply, quickly, compliantly.
-
Authentication, Authorisation, and API Keys
Read more: Authentication, Authorisation, and API Keyse encouraged to create API keys by many SaaS tools, and, these present real authorisation challenges.
-
Mind the gap between the web app and the desktop
Read more: Mind the gap between the web app and the desktopWe want a web app. We have a desktop. Use zero-trust to make any desktop available to any device without a VPN.
-
A ’round tuit’ to get your internal web apps available
Read more: A ’round tuit’ to get your internal web apps availableYou have an internal tool. Grafana, Prometheus, …. You get an alert, its via Slack, Chat, etc. You click. The link goes nowhere. You curse. We fix!