Tag

Zero Trust Architecture

Zero trust architecture posts dive into the technical frameworks and infrastructure designs that support zero trust implementations. Topics include identity-aware proxies, software-defined perimeters, network access control, policy engines, and integration with cloud and hybrid environments.

posts

Remote Desktop Security Risks

Remote Desktop Security Risks: What Attackers See

In 2023, the FBI's Internet Crime Complaint Center flagged Remote Desktop Protocol (RDP) as one of the top three initial access vectors for ransomware incidents. That wasn't a surprise to anyone who monitors Shodan — the search engine that indexes internet-facing devices. On any given day, you

Carl B. Johnson Sep 20, 2019 6 min read
Security in Cloud Computing

Security in Cloud Computing: What Goes Wrong in 2026

The Misconfiguration That Exposed 100 Million Records Updated for 2026 In 2019, a former Amazon Web Services employee exploited a misconfigured web application firewall to steal personal data from over 100 million Capital One customers and applicants. The breach cost Capital One more than $270 million in settlements and remediation.

Carl B. Johnson Feb 02, 2019 7 min read