The Ugly Truth about Your Software Vendor which CISOs Won’t Want (But Do Need) to Hear
We’ve got a hard truth to share with you, and you might not like it: You are not your software…
We’ve got a hard truth to share with you, and you might not like it: You are not your software…
Ten years ago, I was with the U.S. Army in an interrogation room at the detention facility in Parwan, Afghanistan.…
Italy is pondering a new tactic in its war on out-of-control crime: chemical castration for violent sex offenders. Such bold…
Zero-Trust Endpoint Security: How a Preventive Approach Can Limit Your Endpoint Attack Surface Endpoint security has become more critical than…
Adoption of the email authentication and policy specification remains low, and only about a tenth of DMARC-enabled domains enforce policies.…
I was thrilled to catch up with Proofpoint top executives, recently, to discuss Proofpoint’s AI-powered solution and critical issues including…
A survey shows three-quarters of CISOs are drowning in threat detections put out by a sprawling stack of tools, yet…
In 2024, the Federal Communications Commission (FCC) launched the K-12 Cybersecurity Pilot Program, a groundbreaking initiative backed by $200 million…
Brazilian authorities reportedly have arrested a 33-year-old man on suspicion of being "USDoD," a prolific cybercriminal who rose to infamy…
Microsoft is warning enterprise customers that, for almost a month, a bug caused critical logs to be partially lost, putting…