Press Quotes

Developers find themselves in hackers’ crosshairs

Quoted in CSO Online on the takeaway lessons from the GhostCode iOS malware:

Read More...

BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach

Quoted in Digital Guardian on managing the risks of BYOD:

Read More...

Exploding Chip Could Thwart Cyberthieves

Quoted in Tech News World on the implications of self-destructing computer chips:

Read More...

10 Ways Wearables Put Your Network in Serious Danger

Quoted in IT Business Edge on the risks of smartwatches in a business environment:

Read More...

Malware Targets Jailbroken iPhones, Steals Some 225,000 Apple Accounts

Quoted in Re/Code on the announcement of malware affecting iPhones:

Read More...

Smartwatches aren't so clever when it comes to security

Quoted in SC Magazine UK on the security risks posed by smartwatches:

Read More...

How Will Smart Cities Defend Against Hackers?

Quoted in Cisco's The Network on defending city infrastructure from hackers:

Read More...

Report: Ed Sector Target of More Malware Events than any Other

Quoted in The Journal on the prevalence of malware attacks on the education sector:

Read More...

BYOD Security: Expert Tips on Policy, Mitigating Risks, & Preventing a Breach

Quoted in Digital Guardian on mitigating the risk from BYOD:

Read More...

Would your boss pay to automatically destroy employees' inappropriate emails and texts?

Quoted in The Verge on potential business and security concerns with Confide:

Read More...

Yarrr, Matey: Care to Share Yer Files?

Quoted in Ozy on the potential security concerns with PirateBox:

Read More...

Cyber Monday, Black Friday Raise New Data Concerns

Quoted in Politics 365 on retail credit card security and the impact on the consumer:

Read More...

'Enlightened' Non-IT Execs More Likely To Run Secure Organization

Quoted in Wall Street & Technology on the prevalence of security breaches:

Read More...

Only about One-Third of Data Completely Secure, Say U.S. Executives in Survey

Quoted in Business Wire on business' beliefs on data security:

Read More...

Cyber Crusaders

Quoted in Security Management on using penetration tests to support compliance and security:

Read More...

Coming Next Fall: More Chip and PIN Cards in the U.S.

Quoted in U.S. News & World Report on the security issues with magnetic stripe and chip payment cards:

Read More...

Obama's Executive Order On Payment Fraud Falls Short On Boosting Security, Say Experts

Quoted in CRN on the impact of EMV on credit card fraud:

Read More...

Will Retailers Get In Line For Mobile Payments?

Quoted in CRN on the security issues with mobile payment system rollouts, credit card alternatives:

Read More...

Russian Cybercriminals Aim At U.S. Bank Accounts; Malware Infects ATMs

Quoted in CRN on the impact of the JP Morgan breach:

Read More...

Will Wearable Devices Lead To More Theft?

Quoted in IDG Connect on the security impact of wearable devices:

Read More...

Visa risk manager rescues small retailer from credit card fraud

Quoted in TechTarget on the potential risks of alternative payments systems:

Read More...

Are Your Legacy Systems A Security Vulnerability?

Quoted in Global Delivery Report on the security risks of legacy systems:

Read More...

Q&A: What Home Depot customers can now expect

Q&A in Third Certainty on the aftermath of the Home Depot breach:

Read More...

Retail Breaches Could Spur Channel Business, Modernized Payment Systems

Quoted in CRN on the aftermath of the Home Depot breach:

Read More...

What Experts Say is the Single Largest Security Threat to Your Company’s Reputation

Quoted in Online Reputation Management on the impact of breaches on a company’s reputation:

Read More...

MDM is Terrible: When Security Solutions Hurt Security

While the headline is a little too sensationalist for my liking, quoted in PC Magazine SecurityWatch on vulnerabilities in Mobile Device Management products:

Read More...

Black Hat 2014 spotlights mobile device management, modem threats

Quoted in Tech Page One on vulnerabilities in Mobile Device Management products:

Read More...

How 'Backoff' Malware Works and Why Banks Should Care

Quoted in American Banker on the implications of the BackOff malware:

Read More...

Microsoft Fixes 24 Browser Flaws, Adobe Repairs Flash Player Bug

Quoted in CRN on the severity of Flash and Java vulnerabilities:

Read More...

True Detectives: VARs On The Case As The Need For Incident Response Strategies Gets More Evident Every Day

Quoted in CRN on the need for effective monitoring and response based on risk:

Read More...

10 ways to strengthen web application security

Quoted in mrc's Cup of Joe Blog on ways to prevent web application vulnerabilities:

Read More...

New OpenSSL breach is no Heartbleed, but needs to be taken seriously

Quoted in ZDNet on the implications of new SSL vulnerabilities:

Read More...

Time to modernize thinking, technology in fighting malware

Quoted in CSO on the high rate of malware infections:

Read More...

Microsoft issues workaround for Internet Explorer bug

Quoted in USA today on Microsoft’s workaround for the zero-day vulnerability in Internet Explorer:

Read More...

Adobe Critical Flash Player Update Repairs Flaw Used In Targeted Attacks

Quoted in CRN on a new zero-day vulnerability in Internet Explorer:

Read More...

Why security professionals need to get more creative with penetration testing (and how to do it)

Quoted in CSO on techniques to more accurately simulate real-world attacks including combining network and application hacking with phishing, social engineering, and physical infiltration:

Read More...

Hook, Line and Tinder: Scammers Love Dating Apps

Quoted in Wall Street and Tech on the increasing use of dating sites for phishing, spam, fraud, and other attacks:

Read More...

DDoS Attacks Get Trickier, Traditional Defenses Fall Short

Quoted in Wall Street and Tech on evolving Distributed Denial of Service attacks:

Read More...

Navy network hack has valuable lessons for companies

Quoted in CSO on the lessons to be learned from the Navy breach

Read More...

12 Ways to Disaster-Proof Your Critical Business Data

Quoted in CIO on disaster readiness

Read More...

Digi-Ransoms: Meetup.com Latest in Long History of Cyber Hostages

Quoted in NBC News on DDoS blackmail

Read More...

PCI DSS 3.0 is an evolution, not a revolution

Quoted in CSO on the changes in PCI DSS version 3.0

Read More...

Target customers advised to be vigilant

Quoted in USA Today on suggestions for Target customers affected by the breach.

Read More...

Target hack: Tips for all customers

Quoted in CNN Money on suggestions for individuals affected by the Target breach

Read More...

'Worst breach in history' puts data-security pressure on retail industry

Quoted in NBC News on the implications of the Target breach

Read More...

Rising impact of Target breach indicates deeper hack into systems

Quoted in CSO on new revelations of data compromised in the Target breach

Read More...

Insider Threats: Are Your Customers Prepared For Having An Edward Snowden On Staff?

Quoted in CRN on addressing the risks of insider threats

Read More...

Target’s Vast Data Breach Prompts Call For Risk-Based Security Measures

Quoted in CRN on advising companies to use risk-based security to mitigate the threat of breaches similar to Target’s recent exposure

Read More...

Businesses Are Bad At Risk-Assessment, And That's Good For The Channel

Quoted in CRN on the value of risk assessments in security

Read More...

Patch Tuesday: Microsoft Fixes Critical Zero-Day Flaw, Issues Browser Update

Quoted in CRN on critical Microsoft security flaws

Read More...

Cloud-Based DDoS Protection Is Easily Bypassed, Says Researcher

Quoted in CRN on techniques to bypass cloud-based DDoS protection services

Read More...

DDoS Attacks Getting Bigger, Report Finds

Quoted in Network Computing on the growing size of DDoS attacks

Read More...

Network Access Control Gains Traction With BYOD

Quoted in CRN on the “bring your own device” phenomenon driving interest in network access control technologies for network security.

Read More...

Microsoft Reverses Course On Bug Bounties With Reward Program

Quoted in CRN on Microsoft’s initial foray into bug bounty programs

Read More...

Password Pilfering: Amazon, Twitter, Evernote Take On The Identity Crisis

Quoted in CRN on techniques to avoid password theft

Read More...