We Have Seen the Enemy, and It Is Us

The job of the CSO and staff never stops. The security lifecycle requires constant attention through monitoring and analysis, responding to threats, and improving policies and protocols. Activities like patch and replace are Security 101. The trick is to always stay one step ahead of cybercriminals who are relentlessly targeting Continue Reading

Who’s Afraid of the Big, Bad Robot?

Tired of hearing about IoT? Me too. I am also tired of AI and the constant specter of intelligent robots and computers that are smarter than us, and that for some reason want to harm us. I prefer the movie Her because I believe that is more likely to represent the future Continue Reading

Five Areas for Cybersecurity Innovation in 2017

The world never stands still. In the technology space, this means that constant innovation and discovery is the key to a solution provider’s survival and growth. In the cybersecurity arena, this creed is even more vital. Many hackers are brilliant people. There’s only one way to get the better of Continue Reading

SPF, DKIM, and DMARC: Acronym Soup or Useful Email Security?

Spam has been an constant and chronic problem since the early days of the internet.  The first unsolicited mass e-mailing (later termed SPAM) was sent on May 1, 1978 by Gary Thuerk of Digital Equipment Corp (DEC) advertising the VAX T-series to 400 of the then 2600 ARPAnet users. The Continue Reading

Cyber Threat Assessment: How to Find Indicators of Compromise

The threat landscape is in a constant state of evolution, and the arms race between cyberguardians and cybercriminals has been heating up dramatically over the course of the last year. An additional 20 billion IoT devices will be connected to the network by 2020, along with expansive growth in personal Continue Reading

>