Information Security Consulting Services
I’m not going to lie, I love Yoo-hoo drinks, to the point that I have at least one a day and get grumpy if I… Read More »Information Security Consulting Services
I’m not going to lie, I love Yoo-hoo drinks, to the point that I have at least one a day and get grumpy if I… Read More »Information Security Consulting Services
Often in security we get so caught up in firewall rules, anti-virus alerts, or answering audit and compliance surveys that we sometimes put the cart… Read More »Reviewing Information Security Access Control Strategy
I’m an avid hiker and have been a youth leader in several organizations over the past 20 years or so. In outdoor leadership, a core… Read More »Being an Aware Information Security Leader
A data-security perspective on why casting a ballot by mail is more secure than voting in person, and how the Washington State system has potential… Read More »Secure E-voting by Another Name: Vote-by-Mail
Frida, the code instrumentation toolkit, is excellent software. It gives you the power to observe and tamper with the memory of a running process by… Read More »The Rocky Road to Success with the Frida Tool
Have you heard of the Content Security Policy (CSP) “frame-ancestors” directive? It is a newer alternative to the X-Frame-Options header, which offers better control and… Read More »Working with X-Frame-Options and CSP Frame-Ancestors
Metrics are a passion of us at Caliber Security. They provide answers to key questions:• Should we invest more or less in security?• Are we… Read More »NIST Cybersecurity Metrics
Every organization that comes to us for penetration testing is driven by different motives. Our clients come from a variety of industries and range from… Read More »Why Information Security Penetration Testing is Important
Growing up, I played football and it was all that mattered to me. I thought I could never enjoy another sport as much as I… Read More »The Penetration Test Report: Showcase or Garbage?
Today I want to discuss two major tactics in ethical hacking practices: white box and black box hacking. While white box hacking is usually the… Read More »White Box vs Black Box Hacking