SHARED INTEL: New book on cyber warfare foreshadows attacks on elections, remote workers

It’s difficult to convey the scope and scale of cyber attacks that take place on a daily basis, much less connect the dots between them.
Related: The Golden Age of cyber spying
A new book by Dr. Chase Cunningham —  … (more…… Continue reading SHARED INTEL: New book on cyber warfare foreshadows attacks on elections, remote workers

BOOK REVIEW: ‘Security Yearbook’ preserves cybersecurity history — highlights tectonic shift

Along with Richard Stiennon, I belong to a small circle of journalists and tech industry analysts who’ve been paying close attention to cybersecurity since Bill Gates curtailed commercial work on Windows to rivet Microsoft’s attention on de… Continue reading BOOK REVIEW: ‘Security Yearbook’ preserves cybersecurity history — highlights tectonic shift

GUEST ESSAY: Strategic tactics are key to a robust Cloud Security Posture Management regime

A cyber strategy is a documented approach to handling various aspects of cyberspace. It is mostly developed to address the cybersecurity needs of an entity by focusing on how data, networks, technical systems, and people are protected. An effective cyb… Continue reading GUEST ESSAY: Strategic tactics are key to a robust Cloud Security Posture Management regime

GUEST ESSAY: The true cost of complacency, when it comes to protecting data, content

Facebook was lucky when the Information Commissioner’s Office (ICO)—the UK’s independent authority set up to uphold information rights in the public interest—hit the U.S. social media company with a £500,000 fine. Related: … Continue reading GUEST ESSAY: The true cost of complacency, when it comes to protecting data, content