<img height="1" width="1" src="https://www.facebook.com/tr?id=1879927395628828&amp;ev=PageView &amp;noscript=1">
Nathan Wenzler

Nathan Wenzler

Recent Posts By Nathan Wenzler

The Layer 8 Problem

For years, the OSI Model has been the standard for describing the way data moves from the wires and cables in the walls ...

Correcting Bad Behavior (AI Analysis)

Technology fads come and go, especially in the realm of security. Some new product comes out and is touted as the ...

SaaS is Dead. Long Live MaaS!

Over the last decade or so, the ubiquity of the Internet and the scalability of cloud computing has taken the idea of ...

Focus on the Fundamentals

“So, we need to secure our network, but we have a limited budget, staff is already overworked, and we don’t want to ...

The Scammers are Getting Charitable

It’s that time of year again! Black Friday and Cyber Monday have come and gone, and now the run toward Christmas is ...

Follow the Money

In the 1976 film, All the President’s Men, the shady informer known only as Deep Throat tells reporter Bob Woodward how ...

Coding for the Unknown Unknowns

InfoWorld recently published an article called The 7 most vexing problems in programming, which outlines several of the ...

It’s All Connected

Connected (adjective): Joined or linked together

Application Security: The Hacker’s New Playground

It wasn’t all that long ago that vulnerabilities were only something to be considered on infrastructure devices and ...

Cyber Security: It’s Not Just for Techies

The U.S. Department of Homeland security is promoting different themes this October for their National Cyber Security ...

Time and Exploits Wait For No Man

William Penn once said, “Time is what we want most, but what we use worst.” This is especially true in most ...

The Ethics of Political Posturing

Let me open with this statement: I am not a lawyer. Over the course of my career, though, I have worked with many ...

The Crock Pot Approach to Hacking

Huddled in a dark room, buried deep in the basement of a ramshackle building, the lone occupant stares intently at his ...

Credentials Aren’t Just Keys, They’re the Key to Security Success

The most recent Verizon Data Breach Investigation Report (DBIR) has just come out, and among the many findings, there’s ...

Want more of the AsTech Blog? You got it.
Blog subscribers get email updates twice a week.

Comments