Online accounts are integral to cloud computing, encompassing private, public, and hybrid services that store vast amounts of data across…
Here’s a clean little summary of Ayn Rand’s book, Atlas Shrugged, from this Wall Street Journal article: Sound familiar yet?…
Introduction In the business world, operational resilience can be compared to the physical concept of resilience, which defines the ability…
The notorious Tycoon 2FA phishing kit continues its evolution with new strategies designed to slip past endpoint detection systems. This…
I’ve been thinking a lot about what matters in life recently–specifically about focusing in on the things that matter, and…
The scale of cyberattacks seen today is both unprecedented and harrowing. Crucial sectors including healthcare, finance, and education have found…
Threat actors are using open-source software (OSS) repositories to install malicious code into trusted applications, particularly targeting cryptocurrency software. The…
This is an interesting piece over at the Audacious Epigone. It shows that the deeply religious worry the least, which…
In today’s interconnected business world, organizations rely on a vast web of third-party vendors, suppliers, and partners. While these relationships…
Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers, following a trend noted in Forescout…
As organizations increasingly rely on SaaS applications to run their operations, securing them has become a necessity. Without strong protection,…
I was just reading a good post over at securosis by my friend Rich Mogull, and I have a few…











