Search:

Cadre Blog

Category: Security Awareness

How to Legally Practice Social Engineering

Author: Tim O'Connor Social Engineering is without question the most powerful and successful hacker skill of all time, but how can you become fluent enough in this skill to learn and defend against it if the practice is illegal? If you want to learn a skill to protect yourself, your employees or your customers, you must be able practice that particular skill on the fly with real humans i...

Read More
Category: Security Awareness

Should we Fear the Amazon Echo or Other Smart Speakers in our Home?

Author: Tim O’Connor I am a cyber security professional and when I tell some of my peers that I have several Amazon Echo smart speakers in my home and workshop they sometimes look at me like I just said Edward Snowden was my roommate or that I just beamed in from the alternate universe where Spock has a beard. They immediately tell me that these smart speakers send recordings of my voice...

Read More
Category: Events

Cadre Information Security is Hosting a Governance, Risk and Compliance Roadmap Strategy Workshop at Ruth’s Chris Steakhouse.

Luncheon – Louisville, KY   Are you in compliance with regulatory requirements?  Join us on April 12th at Ruth’s Chris Steakhouse at 11:30am to meet our GRC team. Come take a break from your daily work assignments to hear more about Governance, Risk and Compliance. We have professionals David Ponder and Bryan Johnson from Cential and they will be discussing the benefits of having a Gover...

Read More
Category: Security

HID Proximity Access Cards:  Unsafe at Any Speed!

Author: Paul Griggs Many workers are familiar with the venerable HID access card.  You present the card to a badge reader and the door opens.  The badge itself, about the same size as a credit card, identifies the holder to the access control system that controls door access.  But are these badges secure? In the physical lock industry, there is a concept known as a “restricted keyway."  ...

Read More