The Cyber Risk of Mixing Business with Pleasure

 Alastair Paterson wrote an interesting post aboutThe Cyber Risk of Mixing Business with Pleasure that I would like to share."Technical and Process Controls for the...

Hitting the Right Note With a Security Delivery Platform

Erin O’Malley  wrote an interesting post about  Hitting the Right Note With a Security Delivery Platform that I would like to share. "In 1985, F. Murray...

Zero Trust or Bust?

Torsten George  wrote an interesting post about Zero Trust or Bust? that I would like to share. "Implementing a Zero Trust Model Represents a Dramatic Change...

Firewall Migrations: Five Ways to Maximize Security Resilience & Availability

Marie Hattar  wrote an interesting post about Firewall Migrations: Five Ways to Maximize Security Resilience & Availability that I would like to share. "If you...

Europe Cracks Down on Export of Surveillance Technologies

Kevin Townsend wrote an interesting post about Europe Cracks Down on Export of Surveillance Technologies that I would like to share. "The European Union has published...

Attacks Are Advancing; Are Your Threat Detection and Response Capabilities?

 Ashley Arbuckle wrote an interesting post about Attacks Are Advancing; Are Your Threat Detection and Response Capabilities? that I would like to share. "Many organizations have...

New Product Uses Deception to Protect SWIFT-connected Banks

Kevin Townsend wrote an interesting post about New Product Uses Deception to Protect SWIFT-connected Banks that I would like to share. "Following a series of high...

DDoS Attacks Are Primary Purpose of IoT Malware

"Ionut Arghire wrote an interesting post about DDoS Attacks Are Primary Purpose of IoT Malware that I would like to share." As the Internet of Things...

Locky Ransomware Fuels Surge in .RAR, JavaScript Attachments

"Ionut Arghire wrote an interesting post about Locky Ransomware Fuels Surge in .RAR, JavaScript Attachmentsthat I would like to share."Locky malware, currently one of the...

Three Questions Every ICS Security Team Should Ask

"Barak Perelman  wrote an interesting post about Three Questions Every ICS Security Team Should Ask that I would like to share." Securing ICS networks is an...