The volume of destructive malware attacks has risen by 200% year-on-year in the first half of 2019, according to new data from IBM X-Force. Once…View More Destructive Malware Goes Mainstream as Attacks Soar 200%
Over the years I have had the benefit of working as a security practitioner in numerous corporate environments, not as a consultant but as a…View More What Do You Do When A Meteor Hits The Building?
Many organizations are moving away from using the network perimeter as a trust indicator when building and enforcing access policies for apps and other IT…View More Companies with zero-trust network security move toward biometric authentication
“Assume breach” is the popular computer defense strategy based on the idea that your company is either already breached or could easily be breached by…View More Assume breach is for losers: These steps will stop data breaches