Nearly a decade ago a colleague of mine, Brian Armes, and I wrote School Security: A Framework for Collaboration for Campus Safety, detailing what we saw as the basic elements for effective school ...
The unprecedented scale enabled by the cloud revolution has come at a cost: an explosive growth in vulnerability, as each SaaS platform and cyber asset you add to your environment creates a new attack ...
The recently discovered vulnerability involving fax lines on HP multi-function devices, termed Faxploit, are a reminder of the importance of fundamental security practices. I did something a few weeks ...
More than three-quarters of companies regularly take 10 common security steps to improve their overall defensive posture, including instrumenting their Secure Development Lifecycle (SDLC) and using ...