Tinker Tailor Soldier Sam

Tinker Tailor Soldier Sam

The year is 1973. It is the height of the Cold War and a botched assignment to uncover the name of a Soviet mole planted at the top of British Intelligence leads to a high-stakes trail of mystery, deception and intrigue. Nobody can be trusted, nothing is truly as it...
Chatbots create Future of Work

Chatbots create Future of Work

Artificial intelligence (AI) and augmented reality (AR) are rapidly driving companies to digitalize, and these processes are affecting the way IT is organized, too. Now, in addition to being responsible for end user support and hardware and software installation, IT...
What Happens Next? 3 IT Resolutions for 2021

What Happens Next? 3 IT Resolutions for 2021

There is a silver lining to all the challenges and disruption that occurred in 2020. IT leaders and organizations are getting used to dealing with some level of constant change. One of the biggest changes this past year was the shift to remote work. Generally...
Top 10 To The Point Cybersecurity Podcast Episodes of 2020

Top 10 To The Point Cybersecurity Podcast Episodes of 2020

2020 brought some fantastic guests to To the Point Cybersecurity podcast. Eric and I review our top 10 guests, Letterman style in this Episode 114.  2020 Podcast Round Up — Carolyn and Eric’s Top 10 – Ep. 114 Be one of the first 10 to share the episode or...
IceRat evades antivirus by running PHP on Java VM

IceRat evades antivirus by running PHP on Java VM

IceRat keeps low detections rates for weeks by using an unusual language implementation: JPHP. But there are more reasons than the choice of the compiler. This article explores IceRat and explains a way to analyze JPHP malware. Discovery of IceRat User McMcbrad of...