by Dr. Lee Mangold | Apr 23, 2023 | Technology
Many years ago, while working in an Army lab, I had the need for classification backgrounds. I thought I had seen them somewhere, but no one was able to point me to them when I needed them. Years later I learned that my backgrounds had been used in labs everywhere!...
by Dr. Lee Mangold | Apr 23, 2023 | Technology
Many years ago I created an Acceptable Use Policy (AUP) template that was intended for use by my small business clients. I wanted a policy that was short, understandable, and written to be read (not just for compliance). Over the years, I’ve seen pieces of this...
by Dr. Lee Mangold | Apr 23, 2023 | Technology
IT and Security are both high-growth industries. It’s easy to understand that times change, technologies change, and vendors change. It inevitable, and a certain degree of change is always expected. As IT and Security professionals, we expect that continuous...
by Dr. Lee Mangold | Feb 9, 2023 | Uncategorized
Is this what you expected to find at the URL you just clicked? Domain Doppelganger (aka Lookalike domains) are URLs that look similar to a trusted URL, but have subtle differences. Doppelganger domains are used to trick users into visiting a malicious website or...
by Dr. Lee Mangold | Jul 31, 2022 | Technology
Nearly a decade ago I was approached by a defense colleague with this crazy idea of creating a high school cybersecurity summer camp program. We knew it would be a lot of work, but we also knew there was a very real need in our industry: we just don’t have...