September 12, 2017
Newcomers and old hands alike can feel a little lost in the alphabet soup of acronyms in the identity management ...
September 07, 2017
It’s no surprise that Office 365 has become the most widely-used cloud service in the world: Users ...
August 23, 2017
The week before last, I confessed to password tweaking.
Recently Troy Hunt released 320 million ...
August 11, 2017
I have a confession to make. For over twenty years, I’ve been using the same password for most ...
July 21, 2017
When Chris Roberts took the controversial action of accessing sensitive flight systems aboard a live United ...
July 20, 2017
In my last blog post, I sounded the death knell for indicators of compromise (IOCs) — attributes that implicate an ...
July 18, 2017
For over a decade, the security industry has relied on indicators of compromise (IOCs) — attributes that ...
July 17, 2017
The target of the latest breach to hit the news is Verizon, who announced last week that the data from over 14 ...
June 30, 2017
Countries around the globe are putting policies in place to strengthen security and protect their ...
June 30, 2017
As the threat landscape broadens, it’s essential that organizations adopt techniques that bring greater security ...
June 29, 2017
On the heels of the WannaCry ransomware assault comes PetyaWrap, an evolution ...
June 27, 2017
Check out this screenshot. Even though this e-mail is recent, I've been getting this same style of e-mail for the ...