Why Hackers Like Targeting the Terminally Ill

Having a terminally ill family member is a heart wrenching experience. Families put their lives on hold to make a loved one’s last months, weeks and days as comfortable as possible. Compassionate employers, schools, neighbors and friends understa… Continue reading Why Hackers Like Targeting the Terminally Ill

Keep Malicious Actors Out of Your Private Business Workflows

External file threats introduce a malicious file into the organization under the guise of an everyday workflow, generally with the help of an end user. A phishing email with a malicious attachment presents a classic example, but it is far from being th… Continue reading Keep Malicious Actors Out of Your Private Business Workflows

Bromium Customers Praise Fast, Easy Deployment

“Easy to deploy and easy to use!” Every software vendor seems to use this slogan to assure prospects that once they purchase the license, the rest of the journey is going to be a breeze, and the client is going to recover their investment i… Continue reading Bromium Customers Praise Fast, Easy Deployment

How Sigstr Built Customer Trust with Threat Stack and AWS Security — Webinar Recap

On April 24, I had a great conversation with Sam Smith, the Chief Architect for Sigstr, a fast-growing SaaS platform for email signature marketing. Sigstr’s infrastructure is hosted and managed on AWS and secured by Threat Stack. Every day, Sigst… Continue reading How Sigstr Built Customer Trust with Threat Stack and AWS Security — Webinar Recap