Author name: Martin Roy

Why Adopt a Zero Trust Approach?

With the meteoric rise of cyberattacks, teleworking, and the transfer of servers to cloud providers, it’s becoming increasingly difficult to secure access to data and resources required by users. A Zero Trust security model has several distinct advantages and is relatively straightforward to implement. What Are the Principles of Zero Trust? Here are the three …

Why Adopt a Zero Trust Approach? Read More »

FileMaker Server and Linux Security Best Practices

A new Linux vulnerability known as “Dirty Pipe” allows local users to gain root privileges through publicly available exploits. Security researcher Max Kellermann responsibly disclosed the Dirty Pipe vulnerability and stated that it affects Linux Kernel 5.8 and later versions, even on Android devices.