The great attribution debate: Why we should focus on HOW not WHO
Organisations often don’t understand what they need to be protecting themselves from when it comes to costly cyber-attacks. The threat landscape is becoming ever-more …
Organisations often don’t understand what they need to be protecting themselves from when it comes to costly cyber-attacks. The threat landscape is becoming ever-more …
When any new communication medium for sharing information emerges, it’s often quickly followed by those committed to hacking it. This natural progression is …
Around 4am on March 28, 1979, things started to go badly wrong deep inside the bowels of reactor number two at Three Mile Island. Routine maintenance to clear a blockage …
My mother is a lacemaker; thus, her attachment to the Vermeer painting of that name. It’s in the Louvre. If you only know it from reproductions, it’s smaller than …
When you’re on a tight budget for cybersecurity, it can seem almost impossible to secure every part of your businesses’ network without going over budget with the …
The cybersecurity skills gap is one of the most daunting challenges facing the industry. We have a vibrant ecosystem of technology vendors developing shiny new tools, but the …
A recent study showed that over 60 percent of corporate data is stored on employee endpoints. And yet, as companies work to ensure compliance with the new General Data …
In today’s hyper-connected world, email is the foundation of every organization’s collaboration, productivity, and character. And despite annual rumors of its demise, there’s …
With the GDPR deadline looming on May 25, 2018, every organization in the world that transmits data related to EU citizens is focused on achieving compliance. And for good …
Massive data breaches have become the new reality, and they confirm that one of the biggest challenges companies face when it comes to security: a company’s biggest …
The growing implementation of indictments throughout 2017 was arguably the most impactful government action to counter cyber attacks, and yet received little attention. In …
As I write this, the industry is still wagging its fingers at the latest big breach. But in the time that it takes to get this published, there could easily be another …