Tag

Access Control

This tag focuses on access control mechanisms that regulate who can view or use resources within a computing environment. Coverage includes role-based access control, multi-factor authentication, least privilege principles, identity management, and physical access systems that collectively reduce unauthorized entry and data exposure.

posts

Tailgating Attack

Tailgating Attack Cybersecurity: Stop the Walk-In Breach

In 2019, a penetration tester hired by the state of Iowa walked into a locked courthouse after hours simply by following an employee through a secured door. He was arrested — despite being under contract to test exactly that vulnerability. The incident made national headlines and exposed an uncomfortable truth: a

Carl B. Johnson Oct 10, 2020 7 min read
Tailgating Attack

Tailgating Attack Cybersecurity: Stop the Walk-In Breach

In 2019, a penetration tester hired by the state of Iowa walked into a locked courthouse after hours by simply following an employee through a secure door. He was arrested — even though the state had authorized the test. The incident made national headlines and exposed a painful truth: your firewalls,

Carl B. Johnson Sep 01, 2019 7 min read