Telecommunications Industry: Calling for Security Help?
Telecommunications is one of those industries that many people take for granted—until ...
Media and Entertainment Companies: Targets for High-Profile Attacks
When it comes to security vulnerabilities and threats, you might not think about the media ...
Sex, Photos, and the Shared Security Model
Recently, there has been quite a bit of media coverage about some sensitive, private ...
Pointers on Not Being an APT Statistic (or How I Learned to Love Bug)
Several weeks ago we started a series dedicated to considering APTs (Advanced Persistent ...
Distributed Denial of Service in the Cloud or the ‘New Black’ of cyber-criminals
Distributed Denial of Service (DDoS) attacks have started to grow in intensity and ...
APTs and the next generation security - technology facelift or real innovation?
This is the first post in a series dedicated to the trendiest, most disputed and most used ...
As Global Security Concerns Spike, All SMBs Should Bolster Security
Small and medium businesses should shore up their defenses as allegations of rampant spying ...
Is Your Security Losing to Marketing Jiu-Jitsu?
We see, day after day, real and so-called security experts announcing the newest security ...
Virtual Patching Part II: What Makes It So Darn Tricky?
In my last blog post I began a conversation about virtual patching. In this post, I’ll ...


