Way back in 1999, I wrote about open-source software: First, simply publishing the code does not automatically mean that people…
Gain insight about how to build a unified security strategy across large network organizations and how to translate it to…
Learn about how the Capital One attack was carried out, why Web Application Firewalls failed to prevent the attack, and…
The goal of a Threat Hunter is to find an attacker in the middle of an attack before they can…
This is a scarily impressive vulnerability: Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a…
Many systems are vulnerable: Researchers at the time said that they were able to launch inaudible commands by shining lasers…
A recent global study by Tanium of 1,000 CXOs reported on the effects of COVID-19 on enterprise and government organizations.…
Last Thursday, Rudy Giuliani, a Trump campaign lawyer, alleged a widespread voting conspiracy involving Venezuela, Cuba, and China. Another lawyer,…
Digital certificates have taken over as the preferred method of network authentication because of their proven superiority to passwords in…
There are many components involved in running a secure network. It’s very easy to get bogged down by different terminology…