While there’s no absolute correlation between the amount of money allocated and the level of...Continue reading
Spear Phishing
Ransomware – an Ounce of Prevention and a Dollop of Cure
Taking human hostages and exchanging them for money is a messy and very risky business....Continue reading
Cyberwarfare Moves Out of the Shadows
An intense but largely unseen cyberespionage contest between various nation states is finally starting to...Continue reading
NCSAM Week 2 – Creating a culture of cybersecurity
In the digital age, maintaining safe and secure access to connected resources can be critical.Continue reading
Cybersecurity awareness versus IT security fatigue
IT administrators are subjected to thousands of alerts each week, most without context or prioritization.Continue reading
Application Security News for September 2016
Google Chrome to explicitly identify sites that do not use HTTPS Google has been at...Continue reading
Snowden Case Is an Object Lesson in Managing Privileged Access
Getting and the keeping IT security issues on the corporate agenda is not always that...Continue reading
Cyberespionage Is Now a Major Political and Corporate Security Issue
Regardless of how anyone might feel about any of the presidential candidates, the one thing...Continue reading