Security Cloud Privacy Tech

Posts

All posts on markn.ca covering cloud, security, privacy, and technology.

Serverless Is An Ops Model

Serverless architectures are a fantastic solution to a lot—not all—design challenge. The benefits they bring are substantial and they can reduce the overall ops and development burden for a lot of teams. But when we’re talking about serverl...

Cybersecurity & Technical Debt

A recent report from the Canadian Commission for Complaints for Telecom-television Services (CCTS) saw a dramatic increase in complaints with billing being one of the top reasons. That’s not especially noteworthy in an industry known for poor c...

Exposing Secrets In Code

A recent study by NCSU found that there are way more API keys and tokens uploaded to GitHub than previously thought. In fact, there’s almost a near constant stream of secrets being exposed…why?!?

Stadia & Secure Access Design

Google recently announced a new, all-in-the-cloud gaming service called Stadia. For gaming fans, there’s a lot of potential that—fingers crossed—hopefully pans out.

But the design of the system is an implementation of a pattern we...

Cybersecurity Needs Coders

An interesting op-ed from Dr. Egginton at John Hopkins University highlights some efforts underway in the US to declare learning to code the equivalent of learning a new language.

Both are important but will they help your cybersecurity car...

Cloud Costs & Security

A recent survey from RightScale showed a lot of confusion around cloud computing costs. The common take away? Organizations are surprised at how high their cloud bills are. Similarly, the community was surprised at the size of Lyft’s commitm...

Services & Privacy Perceptions

A recent tweet called out a user’s perception about Grammarly, a SaaS-based grammar and writing tool. They accused the service of being predatory (due to it’s license) and a keylogger. While the points are off base (but not insanely so), ...

The Cybersecurity Industry

I you were just starting to try and understand the cybersecurity problem space, a CEO or CIO working to better grasp the challenges facing your organization, how would the industry look? Would you be able to spend wisely? To make decisions taht would...

Warrant Canaries

We rely on some digital services for critical functions around security and privacy. Trusting those services is paramount to their success and ours. But it can be difficult to trust when you don’t know what’s going on behind the scenes. G...

Secret App Telemetry

Websites, apps, and even your desktop applications may be tracking a how lot more of your behaviour than you think. The reason in most cases is simply to deliver a better application from a technical perspective. But sometimes, it’s more insidi...

Your Child’s Digital Identity

You’re building out a digital identity for you kids almost from the day they are born. But it’s not just you, the clubs they belong to, schools they attend, and sports they play are all contributing. What’s the impact to your child?...

DNS Hijacking

There has been a significant increase in DNS hijacking attacks over the past couple of months…and why not? It’s a simple, direct way for cybercriminals to take over an organizations identity or to intercept critical communications.

« Previous Page
 
Next Page »