“Assume breach” is the popular computer defense strategy based on the idea that your company is either already breached or could easily be breached by…View More Assume breach is for losers: These steps will stop data breaches
Hackers backed by the Iranian government recently tried to hack email accounts used by the campaign of a US presidential candidate, a Microsoft official said…View More Microsoft Says Iranian Hackers Tried To Hack A US Presidential Campaign
With over 2.4 billion monthly active users, Facebook is the biggest social network worldwide. And with so many users come tons of data, including some…View More Attention Facebook Users: Here’s What You Need to Know About the Recent Breach
The volume of destructive malware attacks has risen by 200% year-on-year in the first half of 2019, according to new data from IBM X-Force. Once…View More Destructive Malware Goes Mainstream as Attacks Soar 200%
Over the years I have had the benefit of working as a security practitioner in numerous corporate environments, not as a consultant but as a…View More What Do You Do When A Meteor Hits The Building?
Many organizations are moving away from using the network perimeter as a trust indicator when building and enforcing access policies for apps and other IT…View More Companies with zero-trust network security move toward biometric authentication