If you’re a film buff like me, you’ve probably seen The Imitation Game, with Benedict Cumberbatch in the role of Alan Turing. The movie...
Hi, what are you looking for?
If you’re a film buff like me, you’ve probably seen The Imitation Game, with Benedict Cumberbatch in the role of Alan Turing. The movie...
"Adversaries have to build a kill chain. We're not trying to prevent every aspect of that chain, just snap one of those links."
The information security space is a hot, fast-moving market; and with that heat and speed comes both good and bad.
In 2013 I wrote a Security Week column on how security automation and orchestration was a vital and foundational feature in a cloud
“You are chained,” said Scrooge, trembling. “Tell me why the chains bind you.” “I wear the chains I forged in life,” replied Marley. “I...
Earlier this month, during the RSA Conference in Europe, Amit Yoran President of RSA and former cybersecurity director at the U.S. Department of Homeland...
My daughter is still at an age when her imagination kicks into high gear when the lights go out. Sometimes those runaway thoughts get...
2014 was a terrible, horrible, no good, very bad year for cyber attacks.
For far too long, the conversation around cloud and security has revolved around Shadow IT, the use of cloud applications that IT doesn’t know...
In 1880, John Venn, a logician and mathematician born in Hull, England, developed what is now known as the Venn diagram. His goal was...