Cybersecurity

Open Source Does Not Equal Secure

Way back in 1999, I wrote about open-source software: First, simply publishing the code does not automatically mean that people…

3 days ago

The Critical Role of Network Detection and Response in Improving Enterprise Security [Q&A with Vito Rallo of PwC]

Vito Rallo is Director of Cyber Incident and Threat Management at PwC. He and his team provide offensive security and…

3 days ago

Security and COVID-19: Securing the New Normal

The year 2020 is likely to go down in history as one of the most memorable and pivotal periods in…

3 days ago

How a Healthcare Leader Unlocked the Secret to Exceptional Patient Care

Technology is transforming the way healthcare organizations deliver patient care. As people continue to hold their… The post How a…

5 days ago

VMware Horizon Architecture: Planning Your Deployment

What is VMware Horizon? Virtual desktop infrastructure (VDI) products like VMware Horizon enable IT departments to run desktop applications and…

5 days ago

Holiday Shopping Scams and Tips to Stay Safe

In our November monthly episode we discuss the scams that you may encounter this holiday shopping season due to the…

5 days ago

Cyber Thieves are Shopping for You Online

For those of us who partake in holiday shopping, we will be making our purchases... The post Cyber Thieves are…

6 days ago

Amazon Sidewalk, Federal IoT Security Law, Facebook Messenger Bug

In episode 149 for November 30th 2020: Police begin to pilot a program to live-stream Amazon Ring cameras, new details…

6 days ago

DevSecOps: 4 Reasons You Need One

Those familiar with the world of software and application development are probably aware of the concept of DevOps. But what…

2 weeks ago

IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain…

2 weeks ago