top of page
Search


RatT: The Five Digital Plagues of Your Timeline (and How Not to Die Screaming in Binary)
Here’s what’s coming for you in 2025 — not from space lasers or sentient vending machines (yet), but from the very devices you cradle like digital pacifiers.

Randy
May 35 min read
21 views
0 comments


The History of Zero Trust Architecture
Long before Zero Trust became the buzzword it is today, there was a whisper in the halls of enterprise security called “de-perimeterization”

Randall
Apr 14 min read
7 views
0 comments


Encrypted Tunnels: The Ultimate VPN Guide
This guide will help you understand and use VPNs effectively, with real-world examples using ProtonVPN.

Randall
Mar 243 min read
6 views
0 comments


Ports of Entry: How to Lock Down Your Computer Like a Cyber Fortress
Think of ports as doors and windows into your computer. Some of them need to be open - like the front door when guests are expected.

Randall
Mar 234 min read
4 views
0 comments


RatT: Top 5 Application Vulnerabilities in 2025
This is your chance, 2025. Fix your security now, or my timeline is your future.

Randy
Feb 274 min read
3 views
0 comments


The Digital Survival Guide: 5 Steps to Protect Yourself Today
Protecting yourself online doesn’t have to be complicated. By following these five steps, you can reduce your risk of becoming a victim.

Randall
Nov 16, 20244 min read
9 views
0 comments
bottom of page