TOMfoolery Labs
An innovation lab focused on building practical security and productivity tools. Home to projects like PEMLY and Chaos Hub, exploring the intersection of security, automation, and user experience.
An innovation lab focused on building practical security and productivity tools. Home to projects like PEMLY and Chaos Hub, exploring the intersection of security, automation, and user experience.
A Django-based web application for managing your own Certificate Authority. PEMLY wraps CloudFlare's CFSSL toolkit, providing a clean, modern interface for PKI operations without requiring deep cryptographic expertise.
An iOS app that subscribes to external ICS calendars and syncs them into local calendars using EventKit. Features SwiftData storage, CloudKit sync diagnostics, and seamless calendar aggregation for managing multiple calendar subscriptions.
An AI-powered platform that automatically identifies and catalogs book references from podcast episodes, building a searchable database for listeners. Currently indexing The MeatEater Podcast and The Rest Is History.
Cody Chamberlain, NetSPI Head of Product, discusses the three key elements to implementing a successful data breach communication strategy; an incident response plan, open communication, and transparency.
Read more →Data breaches are occurring more frequently than ever before, even when organizations have the best security precautions in place. According to the Identity Theft Resource Center’s 2021 Data Breach Report, data breaches rose 68% from the previous year, reaching the highest number ever reported. That said, while a cyberattack may be out of an organization’s control, one thing it can and should control is how it communicates a breach.
Read more →
Rick Howard speaks with Cody Chamberlain from NetSPI on Breach Communication. Roscosmos publishes locations of Western defense facilities…and subsequently says...
Read more →
A discussion with Mitch Ashley about NetSPI's inaugural Vision Report. We discussed trends, remediaton guidance and the future of the resarch report.
Read more →
The Cody’s as they are “affectionately nicknamed” shed light on how technology alone cannot solve the greatest cyber security challenges. It is achieved when you effectively leverage technology to maximize the value of human creativity, experience and ingenuity."
Read more →