Researchers find organizations struggle with availability for cloud applications as government officials warn of cloud-focused cyberattacks.
Read moreNSA Recommends Using Only ‘Designated’ DNS Resolvers
January 14 2021Agency provides guidelines on securely deploying DNS over HTTPS, aka DoH.
Read moreUpcoming Speaking Engagements
January 14 2021
This is a current list of where and when I am scheduled to speak:
- I’m speaking (online) as part of Western Washington University’s Internet Studies Lecture Series on January... Read more
It's a question that continues to engage debate, as the majority of new physical security devices being installed are now connected to a network. While this offers myriad benefits,...
Read moreVulnerability Management Has a Data Problem
January 14 2021Security teams have an abundance of data, but most of it lacks the context necessary to improve remediation outcomes.
Read moreSolarWinds Attackers May Have Hit Mimecast, Driving New Concerns
January 13 2021Mimecast no longer uses the SolarWinds Orion network management software that served as an attack vector for thousands of organizations.
Read moreHuntress Acquires EDR Technology From Level Effect
January 13 2021Huntress seeks to improve its detection and response capabilities with a more comprehensive view of endpoint security.
Read moreVirtual Pen-Testing Competition Tasks College Students With Running a Red Team Operation
January 13 2021Aimed at developing offensive cyber talent, last weekend's sixth annual Collegiate Penetration Testing Competition brought out some of the brightest from RIT and Stanford, among other universities.
Read moreUnderstanding TCP/IP Stack Vulnerabilities in the IoT
January 13 2021Internet of Things devices are highly susceptible to attacks, breaches, and flaws emanating from issues within the TCP/IP network communications architecture. Here's an overview of what you need to...
Read more
Recent Comments