Blog

Most information security professionals are pretty good at assessing technical risks, and remediating against them. The problem is that such an approach isn't enough. They also need to think in terms of business risk--and communicate technical challenges and remediation strategies in business terms. Back in 2014,...

If you're an infosec professional, you're probably pretty up to speed on ransomware. But do you have the right solutions in place to protect your employees and your organization? Ransomware attacks have skyrocketed in 2016, moving beyond Cryptolocker and Cryptowall to Cerber2 (for which there is...

At times, I feel like I’ve slipped into a time warp with all the talk about digital transformation. Wasn’t “digital” a ‘70s and ‘80s thing, and “transformation” a ‘90s movement for IT? Alas, I have succumbed to the latest buzzword, but I also have found the...

Chalk me down as a believer. After nearly six months of using a team chat app, I'm hooked, and I never want to go back to email. Call it "team chat," "team messaging," "workstream communications and collaboration," or whatever else you want, apps like Atlassian HipChat,...

Unless you've been buried under a rock, if you're a security professional you already know about the "as bad as it gets" security breach in Symantec's antivirus software, which exposes Mac, Windows, and Linux machines--virtually any networked device--without requiring any user interaction whatsoever. Google's cybersecurity team--which...

There’s no arguing that WiFi is pervasive in our lives. Between the number of laptops in a home with its own wireless internet connect and the ever-increasing number of devices that rely solely on wireless, including mobile phones and tablets, the everyday user is extremely...