Lessons From the Cybersecurity Trenches
August 16 2022Threat hunting not only serves the greater good by helping keep users safe, it rewards practitioners with the thrill of the hunt and solving of complex problems. Tap into...
Read moreThreat hunting not only serves the greater good by helping keep users safe, it rewards practitioners with the thrill of the hunt and solving of complex problems. Tap into...
Read moreHeads of CIA and CISA headline event at DC Convention Center.
Read moreHeads of CIA and CISA headline event at DC Convention Center.
Read moreAfter 30 years and a brief pandemic hiatus, DEF CON returns with "Hacker Homecoming," an event that put the humans behind cybersecurity first.
Read moreThe most heavily targeted flaw last quarter was a remote code execution vulnerability in Microsoft Office that was disclosed and patched four years ago.
Read moreZTNA brings only marginal benefits unless you ensure that the third parties you authorize are not already compromised.
Read moreHere's how to flip the tide and tap open source intelligence to protect your users.
Read moreThis is a current list of where and when I am scheduled to speak: I’m speaking as part of a Geneva Centre for Security Policy course on Cyber Security in...
Read moreAttacked once, victimized multiple times: Data marketplaces are making it easier for threat actors to find and use data exfiltrated during ransomware attacks in follow-up attacks.
Read more
Recent Comments