Commentary/blog content written by high-profile security leaders.
3 Places to Enable 2-Factor Authentication Now
Two-factor authentication is a ubiquitous, mature technology. Whether or not you use it for your network, here are three external services for which you should immediately enable it.
August 07, 2014
Microsoft, No-IP, And The Need For Clarity
The Microsoft vs. No-IP case highlights the need for clear standards of abuse handling and transparency on which service providers measure up.
July 07, 2014
Back To Basics
By failing to execute on basic security, we’re making the attacker's job too easy.
June 05, 2014
Preying On A Predator
Mac OS X Snow Leopard is perfectly positioned to be the next target for cybercriminals
February 27, 2014
When Websites Attack
Windows threats like Cryptolocker and ZeroAccess get all of the attention, but malware targeting (Linux) Web servers continues to evolve
December 31, 2013
The Dinosaur In The Room
Support for Windows XP ends in April 2014; the implications extend beyond the workstation
December 05, 2013
What You Need To Know About CryptoLocker
CryptoLocker ransomware is terrorizing home and business users alike. Here's how to protect yourself
November 22, 2013
With Shared Power Comes Shared Responsibility
Security does not rest entirely on your users' shoulders, so don't make them feel like it does
October 17, 2013
The New KISS Rule: Keep Information Security Simple
IT environments are becoming more complex; the solution may be simpler security
September 25, 2013
How To Train Your Users
Help users contribute to your organization's security by teaching them to protect The Four Cs: computers, credentials, connections, and content
September 11, 2013
The More Things Change
Today's malware is more complex than ever, yet it's still based on three basic hacks
August 14, 2013
Has Chrome Struck Security Gold?
Some criminals have all but given up on attacking Chrome users. Have exploit authors met their match in Mountain View, or is there more to the story?
August 01, 2013
Forget Standardization -- Embrace BYOD
The platform standardization ship has sailed, but mobile device management is your ticket to securing all of those handhelds
July 18, 2013
Exclusive: Pwnie Express Evolves The Role Of The Pen Tester
Pwnie Express recently released Citadel PX, which will expand the role of the pen tester. The new offering will enable greater marketability while improving quality of life
June 04, 2013