top of page

Defending the F.O.B. - Work From Home Security Basics for the Post-COVID Paradigm
Its 2020, and while there are still no commercially available VTOL cars or independent AI, we do have the centennial pandemic changing...


Atomic Shelters for Active Observers – Hardening by Example (part 2)
In part 1 of this series we defined a valuable target objective for attackers seeking to advance compromise of a client environment,...


Protecting the Watchtower - Hardening by Example (part 1)
Entities enlisting the services of red teams generally have their house in order to include management and monitoring infrastructure to...


Nomenclature Reclamation: Taking "Hardening" back to Principles and Practices
The term "hardening" is originally sourced from the metallurgical (material sciences of the time) practices around creating processes and...


The Computing Pendulum and Private Cloud
The US market for private cloud has taken a turn for the worse in recent years, to put it mildly. The dream of scalable and resilient...

Secure by Design (Instead of Waiting fo
Hello again world, this time in Wix format. For those who do not know us yet, we are Semper Victus, a cabal of consultants and...
Blog: Blog
bottom of page