Are AI Bots the Future of Cybersecurity?

“It can’t be bargained with. It can’t be reasoned with. It doesn’t feel pity, or remorse, or fear. And it absolutely will not stop, ever.” These prescient words were spoken by Michael Biehn in 1984. Of course, he was talking about a Terminator, not cybersecurity, but the words apply equally. AI bots don’t rest, orContinue reading “Are AI Bots the Future of Cybersecurity?”

Why Is Legacy Software a Security Issue?

Last week, we discussed legacy software and may or may not have insulted a major home improvement retailer. We detailed ways to potentially update your legacy programs, and touched on the most pressing issue, which is security. What we didn’t discuss is why your legacy software may cause security issues. So, why is legacy softwareContinue reading “Why Is Legacy Software a Security Issue?”

What is Application Security? Back to Basics with MacguyverTech

In last week’s blog, we delved into the different specializations that cybersecurity is separated into, and briefly mentioned Application Security. This is akin to discussing Star Wars, mentioning the Jedi, and then never explaining what Jedi do. Rest assured, there’s enlightenment ahead. So, what is Application Security?  Application security is, in its simplest form, exactlyContinue reading “What is Application Security? Back to Basics with MacguyverTech”

MacguyverTech Case Study: HALO® Sleep

The following is a case study to illustrate how MacguyverTech can help a business with application and network security. The importance of a third-party review for apps pre-launch cannot be overstated. Third-party reviews help uncover security flaws and enforce best practices in coding and file directories.   The Client: For over 25 years, HALO®’s missionContinue reading “MacguyverTech Case Study: HALO® Sleep”

Security, Engineering, and UX: Why the New MacguyverTech is Important to You

Imagine you have a customer interested in purchasing a product and having it installed. The product is ordered and designed on one system that only a select few people in your company know how to use. It is then purchased on a second system, and ordered on a third. The manufacturer then has to acknowledgeContinue reading “Security, Engineering, and UX: Why the New MacguyverTech is Important to You”