Blog

Featured image for Capital One AWS Breach

Capital One AWS Breach

The story of the hacker who got hold of 100 million Capital One credit applications and accounts keeps getting bigger. First there's the breach itself -- the woman who hacked her way into the AWS S3 buckets openly talked about her exploits on Twitter and Slack with enough details to make it pretty clear what...
Read More
Featured image for Facebook will pay $5 BILLION for Cambridge Analytica Breach

Facebook will pay $5 BILLION for Cambridge Analytica Breach

The FTC announced that it will fine Facebook $5 Billion (yes that's with a "B") and subject the company to new regulations based on the Cambridge Analytica breach where millions of users data was harvested and targeted for political campaigning.  To date, this is the most expensive fine levied against a company for breaching personal...
Read More
Featured image for Facebook Kids App let's Kids talk to Strangers

Facebook Kids App let's Kids talk to Strangers

Facebook's Messenger Kids App was designed so "Kids can only connect with parent-approved contacts" only it wasn't true. Due to a flaw in privacy settings, kids were able to end up in group chats with unapproved people. While this is obviously a massive #COPPA issue, it's also just a plain old trust issue... When it...
Read More
Featured image for ACL, RBAC, ABAC, PBAC, RADAC, and a Dash of CBAC

ACL, RBAC, ABAC, PBAC, RADAC, and a Dash of CBAC

As the title of this posting probably tells you, there are a LOT of acronyms out there talking about access control. To level the set, here are a few translations: ACL: Access Control List This is your basic gatekeeper. ACL has a list of users and a simple yes/no function, like a doorman at an...
Read More