VPNs: The Cyber Elephant in the Room
September 8 2020While virtual private networks once boosted security, their current design doesn't fulfill the evolving requirements of today's modern enterprise.
Read moreWhile virtual private networks once boosted security, their current design doesn't fulfill the evolving requirements of today's modern enterprise.
Read moreSecurity spending growth will slow in 2020, but purse strings are looser than for other areas of IT.
Read moreAdherence to data protection regulations requires a multidisciplinary approach that has the commitment of all employees. Expect to be asked questions like these.
Read moreBack in July, NIST selected third-round algorithms for its post-quantum cryptography standard. Recently, Daniel Apon of NIST gave a talk detailing the selection criteria. Interesting stuff. NOTE: We're in...
Read moreBack in July, NIST selected third-round algorithms for its post-quantum cryptography standard. Recently, Daniel Apon of NIST gave a talk detailing the selection criteria. Interesting stuff. NOTE: We’re in the process...
Read moreOur recent articles and videos, all in one place.
Read moreI'm switching my website software from Movable Type to Wordpress, and moving to a new host. The migration is expected to last from approximately 3 AM EST Monday until...
Read moreI’m switching my website software from Movable Type to WordPress, and moving to a new host.
The migration is expected to last from approximately 3 AM EST Monday until 4...
Read moreFeeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreAsa ika means "morning squid" in Japanese. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....
Read more
Recent Comments