How to Evict Attackers Living Off Your Land

How to Evict Attackers Living Off Your Land

How to Evict Attackers Living Off Your Land Why invest in top-shelf malware just to have it be turned away by antivirus tools again and again? Why launch a cyberattack like that when your target is already full of perfectly good attack tools, just waiting for you?...
Google sent users 40,000 warnings of nation-state hack attacks in 2019

Google sent users 40,000 warnings of nation-state hack attacks in 2019

Google sent users 40,000 warnings of nation-state hack attacks in 2019 Google’s threat analysis group, which counters targeted and government-backed hacking against the company and its users, sent account holders almost 40,000 warnings in 2019, with government...
3 Mobile Security Problems That Most Security Teams Haven’t Fixed Yet

3 Mobile Security Problems That Most Security Teams Haven’t Fixed Yet

3 Mobile Security Problems That Most Security Teams Haven’t Fixed Yet Workplaces continue to expand beyond the walls of the traditional office building and out into unsecured environments, increasingly relying on mobile devices. But as mobile usage increases, so...
Technology Empowers Pandemic Response, But Privacy Worries Remain

Technology Empowers Pandemic Response, But Privacy Worries Remain

Technology Empowers Pandemic Response, But Privacy Worries Remain   In late January and early February, a study of influenza had the ability to reveal whether subjects in the Seattle area were infected by the novel coronavirus. But medical privacy rules scuttled...
Introducing Zero-Trust Access

Introducing Zero-Trust Access

Introducing Zero-Trust Access   Working remotely has been a reality for many knowledge workers for many years, enabled by the growth and development of the Internet, Wi-Fi connectivity, and mobile computing devices. Indeed, it was this trend that powered the...
The Risky Business Gamble of AI

The Risky Business Gamble of AI

The Risky Business Gamble of AI The worldwide pandemic of Covid-19 has increased the amount of traffic on all of the social networks.  With almost everyone at home, they have more time to comment and research and share stories and opinions.  This means that these...
White-Hat Investigations Unveil Security Issues but Often at their own Peril

White-Hat Investigations Unveil Security Issues but Often at their own Peril

White-Hat Investigations Unveil Security Issues but Often at their own Peril It is rare that any law can outpace technology or the tactics of cybercriminals.  Many times it takes them weeks to discover and solve physical crimes. Since many law enforcement officers are...