What is Zero Trust

What is Zero Trust

Zero Trust Architecture (ZTA) is a security concept that assumes that all network traffic is untrusted and must be verified before it can be allowed access to sensitive resources. The traditional approach to cybersecurity, known as the “castle and moat”...
CAN Vehicles be Hacked?

CAN Vehicles be Hacked?

When I was a kid, my grandpa would inevitably fall asleep watching Sunday Afternoon Baseball, leaving time for my cousin and I to sneak a VHS in the VCR while he was unaware. A frequent pick was monster truck rallies. We would then spend the next hour (or until...
Logistics Meets Security

Logistics Meets Security

In light of the drastic increase in cyber attacks, Oteemo decided to look into the Trucking and Logistics spaces and because it has such a large footprint, it also has great potential to incur some very costly incidents.  Fascinated by all the areas for a...
STIG, SCAP, AWS, Ansible, Oh My!

STIG, SCAP, AWS, Ansible, Oh My!

If you work for the government or are familiar with TLA (Three Letter Acronyms, i.e. FBI, CIA, WTF. etc.) then you know what this blog is about. If not, it is about automating your deployment to the cloud and knowing there is some level of security applied to the...