Author Description

Gary M

Author Posts

Thomas Edison: An Inspiration for Cybersecurity Inventions

As an inventor and patent holder on various cybersecurity inventions and having been involved in the eary…

EpochTimes Exclusive: Supermicro Backup Server Used by Hillary Clinton Highlights Security Risks of China Supply Chain

BY ANNIE WU, EPOCH TIMES (EXCERPT) March 22, 2019 A little-noticed detail in the FBI’s investigation files…

Cyber Security Statistics for 2019

Cybersecurity is often seen as one of those big problems that only large entities like banks, tech…

Wilbur WannaCry: Captured Cyber-villain or Has He Broken Free?

I was talking with my friend Gary Berman, aka “Cyber Hero”, you know – the man behind…

Why You Don’t Need (or Want) a SIEM Tool

There are a lot of things that sound good on paper, but don’t work out as planned…

NETSCOUT ANALYSIS: FACEBOOK OUTAGE

Users around the world experienced an hours-long Facebook and Instagram outage today. The NETSCOUT Threat Intelligence team…

March 2019 – Patch Tuesday Analysis

As March Patch Tuesday landed I happened to be in a room full of IT Admins talking…

The Cyber Risk Handbook – Creating and Measuring Effective Cybersecurity Capabilities

Free eBook: “The Cyber Risk Handbook – Creating and Measuring Effective Cybersecurity Capabilities ($43 Value) FREE For…

New Provisions to China’s National Cybersecurity Law Impose Significant Risk on International Businesses

The Institute for Critical Infrastructure Technology’s (ICIT) publication “Did China Just Legalize Espionage?: Recent Provisions to Chinese…

Bringing Shadow IT into the Light with UEM (Unified Endpoint Management)

Productively managing the security risks of unauthorized apps and devices by Robert Troup, Executive Sales Manager, baramundi…

Show Buttons
Hide Buttons