Articles by Colin Rand

Colin Rand is an engineer and contributor.


The Unknowing Insider: Don’t Be the Mole

Recently, I came across a slick new generative AI tool that proposed to take your presentation, read the content of each slide, give a generated background picture, and modify the layouts to produce a work that looked like it had a team of designers cranking all...

ChatGPT Spearphishing: Social Engineering at Scale

Modern-day SDRs (sales development reps) perform acts of phishing for a living. Today’s business culture, especially in technology sales, accepts this as how business gets done. They do lead generation to identify their target company, cadence messaging to engage and...

Device-Centricity

Oh, network-centered security. What a brilliant idea. Let’s put all our faith in the network and forget about those pesky little devices that connect to it. Who needs to worry about laptops, tablets, and smartphones, anyway? They’re just small,...

Modern Threat Vectors and Device-Centricity

At my first job in the mid 1990s, I was given a workstation to use (a DEC Alpha, for those that were also there). When it came time to look for a new job, I remember using that computer in the office to format my resume and apply for new jobs. Since that first...

Blog: Banyan @ Banyan Part II – Protecting R&D

This is the second in a series of blogs on dogfooding your own product. The first in this series covered how we approached compliance, and in this one we’ll look at how we went about protecting other critical R&D assets. In later posts, we’ll cover remote access...