For endpoint security, trust but verify

For endpoint security, trust but verify

Your organization might eventually fall victim to a data breach but creating checks and balances to maintain a layered data security approach can help you come out the other side with fewer losses.

04/11/18

GDPR keeping you up? There’s another monster hiding under the bed…

GDPR keeping you up? There’s another monster hiding under the bed…

There’s another deadline in May that needs to be paid attention to – the NIS Directive.

02/01/18

What to do about internet-connected toys?

What to do about internet-connected toys?

The allure of interactive, intelligent companions for our children is real, and perhaps unavoidable in the long term. It's best to tread lightly and slowly.

12/21/17

The power of a single insider – lessons from Twitter

The power of a single insider – lessons from Twitter

A recent Twitter incident should be a great reminder for others on how one single person inside your organization can cause a significant incident with a lot of public exposure.

11/03/17

Why DEF CON still matters 25 years later

Why DEF CON still matters 25 years later

Hackers from around the globe are converging in the Nevada desert to celebrate DEF CON's 25th Anniversary.

07/25/17

Understanding the basics of threat abstraction and modeling

Understanding the basics of threat abstraction and modeling

Threat Abstraction and Modeling is an important piece of planning in the enterprise as it can be used as an approach to better secure software. Spending some time during your planning stages thinking about threats and potential...

07/06/17

Load More