Get Our Weekly Blog Sent Straight to Your Inbox
Nathan Rice
Recent Posts
Nonincognito Mode - How Much Data is Google Collecting on You?
4.66 Billion is the number of users estimated to access the internet. That’s right 4.66 billion. That’s 59.5 percent of the global population, meaning that a majority of people on the planet are actively using the internet in some way, shape, or form. Of...
Vendor Risk Management - Forgotten but Not Gone
Vendor Risk Management (VRM), also referred to as Supply Chain Risk Management (SCRM), is the process of managing third-party products and services. VRM ensures that the outsourcing of key business functions, such as IT, does not result in disruption of...
Guidance on Recent Nation-State Cyberattacks Uncovered by FireEye
FireEye On December 8th, cybersecurity firm FireEye reported a breach of their network. According to FireEye, hackers gained access to their environment and were able to obtain many of their Red Team assessment tools. These tools are used to test...
How to Prepare in the Case of Another COVID Induced Shutdown
Preparing for another shutdown Surely you've heard of Severe Acute Respiratory Syndrome Coronavirus 2? What about SARS-CoV-2 or novel coronavirus-2019? COVID-19? Regardless of what you call it, we were all affected by it in March of 2020 when the US was...
The Online Youth: How Risk-Aware Are They?
In the past, this article has been more technically focused. For this article, I decided to take a different approach. In the IT Security field, we stay pretty plugged into the technical community. Most of us have our favorite articles or publication...
Is Your Mobile Device Secure?
A quick note on mobile security For almost 15 years, the mobile computing space has taken the world by storm. What used to take a laptop or desktop, can now be done in the palm of your hand.
Hacking the Car
In today’s Internet of Things (IoT) world, almost everything is reachable online. From your home thermostat and garage door opener to locks on your doors, almost everything is connected (or can be connected) to the internet. Considering all the devices...
Identity Access Management and How it Applies to Security
IAM: Knowing your Roles. “Know your role!”, is a famous quote from professional wrestler, turned actor, Dwayne “The Rock” Johnson. How does this apply to Information Security? Well, sit back and let me explain how a small quote from a giant man can be...
How to Become a Pentester
How did you get you your job? What do I have to do to do what you do? Since becoming a Cybersecurity Expert at TechGuard Security, I have received these questions on several occasions particularly regarding Penetration Testing or pentesting. It’s...
The Threat Within
Secure the perimeter! Man your battle stations! Prepare to repel boarders! Whatever moniker you use to call to attention the threat of outside attackers to your organization, is up to you. The point is it’s dangerous out there, and IT security...
Event Notice: Capture The Flag Event
TechGuard Security is co-sponsoring the OWASP St Louis CTF Event. Join TechGuard Security and OWASP St Louis on April 25, 2019 for this FREE CTF Event. Are you interested in showing off your skills, learning about network security, secure development...