The victim notification conundrum

The victim notification conundrum

Now is the time for the security ecosystem to take stronger action to identify and address compromised computers – sharing lists of known compromises and simply observing the problem is not enough

02/16/2018

In pursuit of the elusive green dot

In pursuit of the elusive green dot

An increasingly complex security landscape (with all the new certification standards, regulations and audits) means we need more universal security standards.

12/07/2017

No target too small, no industry untouched

No target too small, no industry untouched

Automated attacks don't care how big or small your company and industry is.

10/26/2017

The 'hack back' is not a defense strategy

The 'hack back' is not a defense strategy

The urge to strike back against bad actors is getting stronger in the wake of global attacks like Mirai, WannaCry and NotPetya. But while the hack back seems to put power back into victims' hands, it's actually not so simple.

09/27/2017

A security call to arms

A security call to arms

There has never been a more critical time for the security industry to work together to face the unprecedented cyber threats before us. But how? By taking a cue from our adversaries.

08/21/2017

Load More