A zero-trust, prevention-first approach is necessary to keep us safe, now and going forward. In the TV series Mr. Robot, Elliot Alderson, a gifted cybersecurity engineer by day, moonlights...
Read moreAppSec Concerns Drove 61% of Businesses to Change Applications
February 2 2020Some have even left behind commercial software and migrated to open source or in-house homegrown applications. Continue for synopsis or read full research report. The marketplace is beginning to...
Read moreAppSec Concerns Drove 61% of Businesses to Change Applications
February 2 2020Some have even left behind commercial software and migrated to open source or in-house homegrown applications. Continue for synopsis or read full research report. The marketplace is beginning to...
Read moreAshley Madison Breach Returns with Extortion Campaign
February 1 2020The recent attack messages use new techniques to extort Bitcoin payments from Ashley Madison users hit in massive 2015 data breach. Five years after a huge data breach at...
Read moreAshley Madison Breach Returns with Extortion Campaign
February 1 2020The recent attack messages use new techniques to extort Bitcoin payments from Ashley Madison users hit in massive 2015 data breach. Five years after a huge data breach at...
Read moreI didn’t expect that
February 1 2020I remember talking with my marketing team in the summer of 2014 about IoT (Internet of Things) vs. IoE (Internet of Everything). Cisco had come out with IoE hoping...
Read moreI didn’t expect that
February 1 2020I remember talking with my marketing team in the summer of 2014 about IoT (Internet of Things) vs. IoE (Internet of Everything). Cisco had come out with IoE hoping...
Read more‘George’ the Most Popular Password That’s a Name
February 1 2020A new study of stolen passwords reflects the consequences of password overload. The most common type of password is a name, and the most common name password is George,...
Read more‘George’ the Most Popular Password That’s a Name
February 1 2020A new study of stolen passwords reflects the consequences of password overload. The most common type of password is a name, and the most common name password is George,...
Read moreOn Sept. 11, 2019, two security experts at a company that had been hired by the state of Iowa to test the physical and network security of its judicial...
Read more
Recent Comments