Archives

The End of the Industrial-Scale Network

June 25, 2015 |
Why Network Access Control Risk is Failing Security Professionals

One of the concepts gaining credibility in network security today is the idea of the software-defined perimeter. Organizations are beginning to realize that because their users are such a heterogeneous group, it’s no longer viable for them to provision network... Read More

Defending Against an OPM-Style Cyber Attack

June 23, 2015 |
Decorative image

Author Chris Stoneff recently posted a great article on INFOSEC Institute: The Seven Steps of a Successful Cyber Attack. Stoneff makes some great points that I wanted to share as well as provide some additional insights and recommendations. Stoneff states,... Read More

Are You Keeping Your Encryption Keys Secure?

June 9, 2015 |
Decorative Image of padlock

Uber, the San Francisco company behind the popular ridesharing app, is one of Silicon Valley’s highest-valued startups. But it’s also no stranger to controversy, having faced regulatory opposition in many of the major urban centers it operates, as well as... Read More