Upcoming Speaking Engagements
December 14 2021This is a current list of where and when I am scheduled to speak: I’m speaking at the RSA Conference 2022 in San Francisco on February 8, 2022. I’m speaking at...
Read moreThis is a current list of where and when I am scheduled to speak: I’m speaking at the RSA Conference 2022 in San Francisco on February 8, 2022. I’m speaking at...
Read moreSource code is a corporate asset like any other, which makes it an attractive target for hackers.
Read moreIt’s serious:
The range of impacts is so broad because of the nature of the vulnerability itself. Developers use logging frameworks to keep track of what happens in a...
Read more
One volley of fake news may land, but properly trained AI can shut down similar attempts at their sources.
Read moreGet 'em while they're hot!
Read moreThe accounting firm PricewatersCoopers recently published lessons learned from the disruptive and costly ransomware attack in May 2021 on Ireland's public health system. The unusually candid post-mortem found that...
Read moreThe three must-haves in eXtended Detection and Response are: making data accessible, facilitating real-time threat detection, and providing remediation strategies.
Read moreEvery high-profile breach leaves a trail of bread crumbs, and defenders who monitor access brokers can connect the dots and detect attacks as they unfold.
Read moreGovernment actions help starve attack groups of the resources - money, ability to recruit, and time.
Read moreThis Tech Tip outlines how enterprises can use Canarytokens to find servers in their organization vulnerable to CVE-2021-44228.
Read more
Recent Comments