To celebrate Star Wars Day, I thought I would share a few ways in which the Empire did not adhere to information security best practices, and that enabled the Rebels to win.
To be clear: I do not support the Empire, the Sith Lords, or any other types of scum and villainy. Nor am I trying to portray the Rebel Alliance as a weird, Force-wielding, Galactic hacker consortium or something. But had the Empire not been so lax in their security controls, Emperor Palpatine and his buddies might have been able to bring their “order and peace” to the galaxy.
Chris Steffen

Recent Posts
Star Wars Day – How Security Failures Led to the Empire’s Downfall
By Chris Steffen on May 4, 2023 9:58:11 AM
The Harsh Truth About Layoffs in the Tech Industry
By Chris Steffen on Feb 14, 2023 10:48:37 AM
Seemingly every day, we hear about the next batch of layoffs from the household-name tech companies: 10,000 here, 1,700 there. As we continue into earning seasons for these publicly traded (and some not publicly traded) companies, we will likely hear more. The substory is that unemployment is at an all-time low, with the job market adding over 500,000 jobs in January.
Cybersecurity Asset Management for Vulnerability Management: Key Capabilities, Benefits
By Chris Steffen on Feb 28, 2022 8:46:39 AM
This is the last in a three-part blog series by Enterprise Management Associates for Axonius discussing how vulnerability management can be expanded and simplified by using a cybersecurity asset management solution. In Part 1, we looked at how cybersecurity asset management can simplify vulnerability management and Part 2 focused on how a cybersecurity asset management solution improves an organization’s vulnerability management program. Part 3 of the series provides a brief summary and some perspectives on the benefits of a cybersecurity asset management solution as it relates to vulnerability management.
Improving Vulnerability Management With Cybersecurity Asset Management
By Chris Steffen on Feb 17, 2022 10:08:25 AM
This is the second in a three-part blog series by Enterprise Management Associates for Axonius discussing how vulnerability management can be expanded and simplified by using a cybersecurity asset management solution. In Part 1, we looked at how cybersecurity asset management can simplify vulnerability management. Part 2 of the series focuses on how a cybersecurity asset management solution improves an organization’s vulnerability management program.
Simplify Vulnerability Management With Cybersecurity Asset Management
By Chris Steffen on Feb 10, 2022 9:41:39 AM
This is the first in a three-part blog series by Enterprise Management Associates (EMA) for Axonius discussing how vulnerability management can be expanded and simplified by using a cybersecurity asset management solution. Part one of the series focuses on defining the cybersecurity asset management solutions category and includes a summary definition of vulnerability management.
Data Security in a Multi-Cloud World...
By Chris Steffen on Jul 22, 2021 8:24:36 AM
F5 / AWS Integration Podcast...
By Chris Steffen on Oct 20, 2020 9:35:31 AM
I had the opportunity to participate in a podcast with the team at F5. Christine Puccio – VP of Global Cloud Alliances and Heath Parrott – Senior Global Solutions Architect for Cloud discussed their latest announcement: the integration between F5 Essential App Protect, a web application firewall (WAF) SaaS solution and Amazon CloudFront, a content delivery network (CDN) solution from Amazon Web Services (AWS).
F5 WAF / AWS CloudFront Integration...
By Chris Steffen on Oct 20, 2020 8:00:00 AM
Recently, I had the opportunity to participate in a podcast with the team at F5. Christine Puccio – VP of Global Cloud Alliances and Heath Parrott – Senior Global Solutions Architect for Cloud discussed their latest announcement: the integration between F5 Essential App Protect, a web application firewall (WAF) SaaS solution and Amazon CloudFront, a content delivery network (CDN) solution from Amazon Web Services (AWS). Before discussing the announcement specifically, I thought it would be best to provide a bit of insight into these complementary technologies.
Prioritizing Security When Selecting A Video Conferencing Solution...
By Chris Steffen on Apr 10, 2020 9:08:08 AM
Before the recent COVID -19 pandemic, most companies looked at unified communications and collaborations (UC&C) solutions as important technology often used by sales and marketing teams as part of their process, but not necessarily a critical part of the business infrastructure. With work from home (WFH) becoming the mandated norm, businesses have come to look at UC&C solutions as mission-critical tools, allowing managers and leaders to communicate with their employees and employees to conduct some semblance of normal business.
FBI Warns of Coronavirus Scams
By Chris Steffen on Mar 23, 2020 11:08:03 AM
On Friday, the FBI released an alert warning of increased scams related to the Coronavirus outbreak. From the FBI announcement: