As cyber threats grow more sophisticated, America cannot afford complacency. The time for decisive action and enhanced cyber resilience is now.
Hi, what are you looking for?
As cyber threats grow more sophisticated, America cannot afford complacency. The time for decisive action and enhanced cyber resilience is now.
Because you can’t secure what you can’t see, having real-time asset visibility across the network is vital to maximizing security, minimizing risk, and protecting...
Consumer IoT devices will increase the threat to commercial, government, healthcare, educational, and other organizations.
Every asset in an organization’s inventory that is not accounted for and protected is a potential attack vector that an attacker can use to...
If you’re a film buff like me, you’ve probably seen The Imitation Game, with Benedict Cumberbatch in the role of Alan Turing. The movie...
"Adversaries have to build a kill chain. We're not trying to prevent every aspect of that chain, just snap one of those links."
The information security space is a hot, fast-moving market; and with that heat and speed comes both good and bad.
In 2013 I wrote a Security Week column on how security automation and orchestration was a vital and foundational feature in a cloud
“You are chained,” said Scrooge, trembling. “Tell me why the chains bind you.” “I wear the chains I forged in life,” replied Marley. “I...
Earlier this month, during the RSA Conference in Europe, Amit Yoran President of RSA and former cybersecurity director at the U.S. Department of Homeland...
My daughter is still at an age when her imagination kicks into high gear when the lights go out. Sometimes those runaway thoughts get...