Yearly Archive

2017

Locking Down the Endpoint

The most common second step of any security breach is the exploit of a security vulnerability in a platform or application. Today, that includes not just PCs and Mac, but a whole host of mobile devices, and all the systems sitting in our datacenters, the cloud, and the Internet at large.

Read More…

Moats, Walls, Threats, Networks

Who’s in your network? The adversaries are already past the gate. One third of US companies were breached in 2016, and even more don’t yet know that they have already been breached. The amount of time-to-discover that a breach has happened is measured in weeks and months when the time-to-compromise defenses is measured in minutes. The moats and walls of yesteryear aren’t keeping us safe from the adversary anymore.

Read More…