Cybersecurity professionals encounter the concept of integrating people, processes and technology frequently. The concept will appear in virtually every vendor's sales presentation as well as in[…]Read More
It is not often that movies and television shows give viewers the opportunity to explore the world of hacking and digital security in a realistic manner. After two seasons, "Mr. Robot" has[…]Read More
According to an article appearing in AT&T Cybersecurity Insights, 62 percent of all organizations surveyed admitted that they had suffered a breach in 2015. Furthermore, although 42 percent[…]Read More
You are one step away from security automation by attending Black Hat Europe 2016 in London.
Security automation is the next big thing in the war against hacker attacks as it is the key to[…]Read More
With so much attention given to increasingly prevalent data breaches by the media these days, you might think that every enterprise would have an effective breach response plan in place. However,[…]Read More
In a previous life, I was involved in the DevOps and Docker communities.
I was really impressed by the amount of quality content in those areas, and the amazing communities around that space, that[…]Read More
When it comes to incident response and a company’s ability to manage a data breach, no organization wants to be caught off guard. The effects of an uncontrolled and poorly managed data breach can[…]Read More