Focus on the Countless Manageable Vulnerabilities That You Can Control and Protect Against
Hi, what are you looking for?
Focus on the Countless Manageable Vulnerabilities That You Can Control and Protect Against
Over the years, I have participated in many advisory boards. In every case, I have been a strong supporter of the business and wanted...
The Biggest Mistake People Make With Security Advisory Boards is Not Using Them
Reading legal documents is not something I usually enjoy. The Muller indictment of the Russian DNC hackers was different - the amount of detail...
There has been endless discussion among security professionals about the ethics, propriety, legality, and effectiveness of corporations “hacking back” against attackers. On the other...
Sites on the Dark Web Have Several Motivations to Unmask Their Visitors
Perfect Operational Security (OPSEC) Needs to Start From Day One
The radical changes taking place in privacy and security, both for better and for worse, are driven by the rapid adoption of facial recognition...
Are the ‘Hack Back’ Laws Being Proposed by Congress a Good Idea?
Internet Traffic Modifications by ISPs After the Decision to End Net Neutrality Create a Huge Potential Attack Surface
With the holiday season upon us, take a moment to think on the security of the plethora of IoT devices that will be purchased,...
Information security is built on the pillars of confidentiality, integrity, and availability. Confidentiality is about making sure your secrets stay secret.
While mergers and acquisitions (M&A) are generally known for bringing economic growth and opportunity, people are beginning to realize that the process also brings...
Situational awareness is critical in every kind of engagement. The internet is no exception. Effectively all modern conflicts take place, at least in part,...
I love watching reality shows about paramedics. It is thrilling to see the EMTs rush to a scene and take immediate action to save...
Breached Companies Must get Ahead of Attacks and Provide Security that Protects Victims Before they are Victimized Again
I remember my first Kung Fu lesson. It left me almost sick from exhaustion. It also taught me a valuable lesson that proved to...
Careful Design of Network and System Security Architecture Can Substantially Enhance Security