top of page
Data Sovereignty in the Age of the Mobile Dragnet
The Prey of Trawlers and Spear-Fishermen During the rest of this year Apple and Google will amass more data on their users and people...
A Serial Case of AIR on the Side-Channel
In our previous post, we covered the mechanism of API access Into SOA/cloud Runtime by way of Amazon Web Services' SSM stack - an API...
Once Upon a Cloudy AIR I Crossed a Gap Which Wasn't There
A key tenet of security paradigm and function is the concept of segmentation - developers are taught (and sometimes forced) to keep data...
Defending the F.O.B. - Work From Home Security Basics for the Post-COVID Paradigm
Its 2020, and while there are still no commercially available VTOL cars or independent AI, we do have the centennial pandemic changing...
Atomic Shelters for Active Observers – Hardening by Example (part 2)
In part 1 of this series we defined a valuable target objective for attackers seeking to advance compromise of a client environment,...
Protecting the Watchtower - Hardening by Example (part 1)
Entities enlisting the services of red teams generally have their house in order to include management and monitoring infrastructure to...
Nomenclature Reclamation: Taking "Hardening" back to Principles and Practices
The term "hardening" is originally sourced from the metallurgical (material sciences of the time) practices around creating processes and...
The Computing Pendulum and Private Cloud
The US market for private cloud has taken a turn for the worse in recent years, to put it mildly. The dream of scalable and resilient...
Secure by Design (Instead of Waiting for the Facts to Hit the Fan)
Hello again world, this time in Wix format. For those who do not know us yet, we are Semper Victus, a cabal of consultants and...
Blog: Blog
bottom of page