4 Steps to a More Mature Identity Program
July 1 2020Security has evolved to evaluate an identity's attributes, access, and behavior to determine appropriate access.
Read moreSecurity has evolved to evaluate an identity's attributes, access, and behavior to determine appropriate access.
Read moreTogether with Nate Kim (former student) and Trey Herr (Atlantic Council Cyber Statecraft Initiative), I have written a paper on IoT supply chain security. The basic problem we try...
Read moreWhile financial institutions and government remain popular targets, COVID-19 research organizations are now also in the crosshairs.
Read moreBooby-trapped images could be used to attack Windows 10 and Windows Server 2019 - update now!
Read moreNo US entity charges citizens for registering to vote, but plenty of Google ads were happy to do so - and to grab your PII in the process....
Read moreTLS 1.0 and TLS 1.1 are now considered security risks and blocked by default.
Read more
Recent Comments