top of page
Search


RatT: Attack of the Cloned Chatbots
A recent token theft incident shows how third-party AI helpers can unlock your accounts if you are not careful. This is a fast primer for real people, not only big companies.

Randy
Sep 40 min read


RatT: The Five Digital Plagues of Your Timeline (and How Not to Die Screaming in Binary)
Here’s what’s coming for you in 2025 — not from space lasers or sentient vending machines (yet), but from the very devices you cradle like digital pacifiers.

Randy
May 35 min read


The History of Zero Trust Architecture
Long before Zero Trust became the buzzword it is today, there was a whisper in the halls of enterprise security called “de-perimeterization”

Randall
Apr 14 min read


Encrypted Tunnels: The Ultimate VPN Guide
This guide will help you understand and use VPNs effectively, with real-world examples using ProtonVPN.

Randall
Mar 243 min read


Ports of Entry: How to Lock Down Your Computer Like a Cyber Fortress
Think of ports as doors and windows into your computer. Some of them need to be open - like the front door when guests are expected.

Randall
Mar 234 min read


RatT: Top 5 Application Vulnerabilities in 2025
This is your chance, 2025. Fix your security now, or my timeline is your future.

Randy
Feb 274 min read


The Digital Survival Guide: 5 Steps to Protect Yourself Today
Protecting yourself online doesn’t have to be complicated. By following these five steps, you can reduce your risk of becoming a victim.

Randall
Nov 16, 20244 min read
bottom of page
