Participants across the globe worked together to respond to a simulated significant cyber incident impacting critical infrastructure.
Read moreA starting point for secure UI and UX? Remember that security measures should frustrate attackers, not users.
Read moreIf you live in the UK and hadn't yet heard of cryptocoin ATMs... it's too late now!
Read moreCatching the Evasive REvil Ransomware Gang With AI
March 14 2022Ransomware-as-a-service gangs are difficult to shut down, but sophisticated, AI-driven defenses may finally be killing their profits.
Read moreMobile Threats Skyrocket
March 14 2022A new report shows an explosion of zero-day attacks and malware focused on mobile devices just as companies adopted widespread bring-your-own device policies.
Read moreGovernments Should Decide Who Gets to Buy Spyware
March 14 2022And the world must face the fact that offensive cyber tools have evolved into weapons that are no different from tanks, drones, or missiles.
Read moreUpcoming Speaking Events
March 14 2022This is a current list of where and when I am scheduled to speak:
- I’m participating in an online panel discussion on “Ukraine and Russia: The Online War,” hosted... Read more
Leak of Russian Censorship Data
March 14 2022The transparency organization Distributed Denial of Secrets has released 800GB of data from Roskomnadzor, the Russian government censorship organization.
Specifically, Distributed Denial of Secrets says the data comes from...
Read more
Domain Codex allows users to search more than 370 million Internet domain names and associated data.
Read moreWhen IT Spending Plans Don’t Reflect Security Priorities
March 11 2022Data shows a disconnect between what decisionmakers consider top endpoint security priorities and how they focus their budget.
Read more
Recent Comments