In my recent post 5 More Ways I Can Steal Your Data – Work for You & Stop Working for You I started telling the story of a security guard…
I’ve spent countless hours trying to find the perfect tool for the job. In fact, I’ve spent more hours searching at times than I have doing the work. You’ve probably…
A SaaS product needs to use security measures you might not ordinarily use in an on-premises solution. In particular, it’s important for all sensitive data to be secured. Encryption plays…
“Intelligence is the ability to adapt to change.” –Stephen Hawking Search for the term “threat intelligence” and you’ll get 12.3 million hits. Not all of them are relevant to cyber,…
“Horizontal expansion loses the depth, though excessive depth that only provokes darkness is futile. Therefore a balance between depth and vastness is essential in learning” ― Privavrat Thareia This year, consider…
The average total cost of a data breach right now is $3.79 million, according to the 2015 Cost of Data Breach Study: Global Analysis. Cyber attacks are one of the top…