Author Description

Gary M

Author Posts

One Phish, Two Phish, Three Phish, Fraud Phish

Request Your Free eBook Now: “One Phish, Two Phish, Three Phish, Fraud Phish“ From there to here,from…

8 Real World Use Cases for SOAR e-book

Request Your Free eBook Now: “8 Real World Use Cases for SOAR e-book“ Less than 1 percent…

Research from Trustwave Details New Trends in Cyberattacks

Social engineering, sextortion campaigns and retail attacks are on the rise as enterprises strengthen security efforts and…

MEASURE YOUR SECURITY

Why measurement is at the core of Analogue Network Security, and why Cybersecurity without metrics is a…

SiteLock 2019 Website Security Report: Protecting Websites in the Age of Stealth Attacks

Among the cryptojacking-buzz, Facebook’s data breach saga, and nation-state attacks on companies like Nissan, you likely noticed…

Security Forecast: Cloudy with a chance of doom!

A brief digest from the 2019 Thales Data Security Summit  Washington, D.C. – When my train pulled…

BREAKING NEWS: WikiLeaks Founder Julian Assange Charged in 18-Count Superseding Indictment

Charges Related to Illegally Obtaining, Receiving and Disclosing Classified Information A federal grand jury returned an 18-count…

KB4-Con 2019 Trip Report

Take a Deep Dive Against the Wave of New Threats and Compliance Risks by Gary S. Miliefsky,…

May Patch Tuesday

Be Aware of Skype for Android Vulnerability and Windows Error Reporting Elevation of Privilege Vulnerability by Chris…

The Dangers of Backdoor Software Vulnerabilities and How to Mitigate Them

by Bob Flores, President and CEO of Applicology, and Former CTO of the Central Intelligence Agency In…

Show Buttons
Hide Buttons