Tony Bradley

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.

VTech hack exposes personal information of millions of customers

An encryption back door won’t actually help intelligence agencies

An encryption back door won’t actually help intelligence agencies

Intelligence agencies and law enforcement claim they need a back door in encryption algorithms for safety and national security, but the logic is flawed and the fallout from an encryption back door would do more harm than good.

Damballa warns that the enemy may already be in your network

Damballa warns that the enemy may already be in your network

Researchers from Damballa analyze the malware behind the Sony and Saudi Aramco breaches to figure out how it was able to remain undetected for so long.

Patch Tuesday demonstrates strength of Microsoft Edge browser security

Patch Tuesday demonstrates strength of Microsoft Edge browser security

Microsoft released 12 new security bulletins--many addressing remote code execution flaws spanning the Windows operating system and many of the most popular Microsoft applications.

Vera partnership gives Dropbox comprehensive data security

Vera partnership gives Dropbox comprehensive data security

Vera, Okta, and Dropbox team up to provide Dropbox customers with comprehensive, end-to-end security and data protection in the cloud.

TalkTalk hit by data breach and ransom demand

TalkTalk hit by data breach and ransom demand

TalkTalk—a London-based telecommunications company—revealed that its customer database has been breached and that attackers are demanding payment.

HP sells TippingPoint to Trend Micro

HP sells TippingPoint to Trend Micro

HP is divesting itself of TippingPoint--selling the intrusion prevention and mitigation company to its strategic partner, Trend Micro, for $300 million.

Who is responsible for security in the cloud?

Who is responsible for security in the cloud?

Armor (formerly FireHost) teamed up with the Ponemon Institute to research whether the cloud service provider or the company itself is ultimately responsible for cloud security.

Wombat acquires ThreatSim to extend security awareness training capabilities

Wombat acquires ThreatSim to extend security awareness training capabilities

Wombat Security announced that it is adding spear-phishing specific security awareness training to its portfolio with the acquisition of ThreatSim.

Experts warn users to quickly apply Microsoft Patch Tuesday updates

Experts warn users to quickly apply Microsoft Patch Tuesday updates

Security experts weigh in on Microsoft Patch Tuesday with advice about which updates are most urgent and what you need to know to protect yourself against exploits.

Intel Security warns don’t open that email about Armin van Buuren and other ‘dangerous’ celebrities

Intel Security warns don’t open that email about Armin van Buuren and other ‘dangerous’ celebrities

The 9th annual Intel Security Most Dangerous Celebrities list is here and this year it is topped by DJ Armin van Buuren.

HackerOne launches free Vulnerability Coordination Maturity Model tool

HackerOne launches free Vulnerability Coordination Maturity Model tool

HackerOne developed a free benchmarking tool called the Vulnerability Coordination Maturity Model to help organizations determine where they are on the maturity spectrum and identify areas for improvement.

Load More