“It has gotten to the point, unfortunately, where they are so frequent and common these days, that it’s like, here we go again,” Christopher Sitter says when I asked him about…
Browsing CategorySecurity Intelligence
3 Reasons Cyberattacks are Increasing (and How Zero Trust Can Help)
The events of 2020 left a lasting impression on the way people work. A third of Americans polled in September 2020 were always working remotely — down from more than…
IAM Security: IBM Named Overall Leader
Being unable to do your work because you can’t log in to something is an annoying barrier. Your enterprise needs to provide secure support for connected devices. At the same…
New Ransomware Threats Are Getting Bolder: How to Rewrite the Script
Greater exposure is both good news and bad news when it comes to new ransomware threats. While ransomware attacks themselves are never good news, it is a positive sign that…
Pwn2Own 2021: Zoom, Teams, Exchange, Chrome and Edge “fully owned”
Two lucky winners scooped $200k for just 30 minutes’ work – if you don’t count the days, weeks and months of meticulous effort beforehand
How Vulnerability Management Can Stop a Data Breach
Vulnerability management may not be the sexiest topic. But, while buzzier topics are certainly important, vulnerability management may just be the key to an effective data security strategy. According to…
S3 Ep27: Census scammers, beg bounties and data breach fines [Podcast]
New episode – listen now!
Why E-Commerce Security Matters Now More Than Ever
In February 2020, the world’s biggest retailer, Amazon, fended off the largest distributed denial of service (DDoS) attack in history. As peak traffic volume hit 2.3 Tbps, e-commerce security experts…
Using the Threat Modeling Manifesto to Get Your Team Going
Secure software development requires a ‘shift left’ — paying attention to security and privacy early in the life cycle. Threat modeling is a very useful activity for achieving this goal,…
What Does Modern Even Mean? How to Evaluate Data Security Solutions for the Hybrid Cloud and Beyond
There is a lot of talk about ‘modern’ data security. Organizations want a data security strategy that aligns with a digitally transformative vision. Tech can sometimes drown in buzzwords. What do…