Destructive Malware Goes Mainstream as Attacks Soar 200%

Destructive Malware Goes Mainstream as Attacks Soar 200%

The volume of destructive malware attacks has risen by 200% year-on-year in the first half of 2019, according to new data from IBM X-Force. Once…

View More Destructive Malware Goes Mainstream as Attacks Soar 200%
What Do You Do When A Meteor Hits The Building?

What Do You Do When A Meteor Hits The Building?

Over the years I have had the benefit of working as a security practitioner in numerous corporate environments, not as a consultant but as a…

View More What Do You Do When A Meteor Hits The Building?
Companies with zero-trust network security move toward biometric authentication

Companies with zero-trust network security move toward biometric authentication

Many organizations are moving away from using the network perimeter as a trust indicator when building and enforcing access policies for apps and other IT…

View More Companies with zero-trust network security move toward biometric authentication
Assume breach is for losers: These steps will stop data breaches

Assume breach is for losers: These steps will stop data breaches

“Assume breach” is the popular computer defense strategy based on the idea that your company is either already breached or could easily be breached by…

View More Assume breach is for losers: These steps will stop data breaches