29 09, 15
Quoted in CSO Online on the takeaway lessons from the GhostCode iOS malware:
Read More... Tags: Malware, Mobile Device Security
28 09, 15
Quoted in Digital Guardian on managing the risks of BYOD:
Read More... Tags: Mobile Device Security, BYOD
22 09, 15
Quoted in Tech News World on the implications of self-destructing computer chips:
Read More...14 09, 15
Quoted in IT Business Edge on the risks of smartwatches in a business environment:
Read More... Tags: Mobile Device Security
31 08, 15
Quoted in Re/Code on the announcement of malware affecting iPhones:
Read More... Tags: Malware, Mobile Device Security
17 08, 15
Quoted in SC Magazine UK on the security risks posed by smartwatches:
Read More...08 07, 15
Quoted in Cisco's The Network on defending city infrastructure from hackers:
Read More... Tags: Smart Cities
23 06, 15
Quoted in The Journal on the prevalence of malware attacks on the education sector:
Read More...17 06, 15
Quoted in Digital Guardian on mitigating the risk from BYOD:
Read More... Tags: BYOD
04 02, 15
Quoted in The Verge on potential business and security concerns with
Confide:
Read More... Tags: Ephemeral Data
02 02, 15
Quoted in Ozy on the potential security concerns with
PirateBox:
Read More... Tags: Malware, File Sharing
01 12, 14
Quoted in Politics 365 on retail credit card security and the impact on the consumer:
Read More...21 11, 14
Quoted in Wall Street & Technology on the prevalence of security breaches:
Read More... Tags: Breaches
12 11, 14
Quoted in Business Wire on business' beliefs on data security:
Read More... Tags: Breaches, Risk-Based Security
10 11, 14
Quoted in Security Management on using penetration tests to support compliance and security:
Read More... Tags: Penetration Testing
28 10, 14
Quoted in U.S. News & World Report on the security issues with magnetic stripe and chip payment cards:
Read More... Tags: Chip and PIN
20 10, 14
Quoted in CRN on the impact of EMV on credit card fraud:
Read More... Tags: PCI Compliance, Fraud, Chip and PIN
18 10, 14
Quoted in CRN on the security issues with mobile payment system rollouts, credit card alternatives:
Read More... Tags: PCI Compliance
08 10, 14
Quoted in CRN on the impact of the JP Morgan breach:
Read More... Tags: Breaches
07 10, 14
Quoted in IDG Connect on the security impact of wearable devices:
Read More... Tags: Mobile Device Security
29 09, 14
Quoted in TechTarget on the potential risks of alternative payments systems:
Read More... Tags: PCI Compliance
28 09, 14
Quoted in Global Delivery Report on the security risks of legacy systems:
Read More... Tags: PCI Compliance, Segmentation, Legacy Systems
11 09, 14
Q&A in Third Certainty on the aftermath of the Home Depot breach:
Read More... Tags: Breaches, Home Depot Breach, PCI Compliance, Chip and PIN
11 09, 14
Quoted in CRN on the aftermath of the Home Depot breach:
Read More... Tags: Breaches, Home Depot Breach, PCI Compliance, Chip and PIN
08 08, 14
Quoted in Online Reputation Management on the impact of breaches on a company’s reputation:
Read More... Tags: Breaches, Detection and Response, Risk-Based Security
06 08, 14
While the headline is a little too sensationalist for my liking, quoted in PC Magazine SecurityWatch on vulnerabilities in Mobile Device Management products:
Read More... Tags: Vulnerabilities, Mobile Device Security, BYOD, Zero Days, Application Security
06 08, 14
Quoted in Tech Page One on vulnerabilities in Mobile Device Management products:
Read More... Tags: Vulnerabilities, Mobile Device Security, BYOD, Zero Days, Application Security
04 08, 14
Quoted in American Banker on the implications of the BackOff malware:
Read More... Tags: Malware, Fraud
08 07, 14
Quoted in CRN on the severity of Flash and Java vulnerabilities:
Read More... Tags: Vulnerabilities, Microsoft, Flash
07 07, 14
Quoted in CRN on the need for effective monitoring and response based on risk:
Read More... Tags: Target Breach, Risk-Based Security, Detection and Response
17 06, 14
Quoted in mrc's Cup of Joe Blog on ways to prevent web application vulnerabilities:
Read More... Tags: Application Security, Vulnerabilities
06 06, 14
Quoted in ZDNet on the implications of new SSL vulnerabilities:
Read More... Tags: Heartbleed, Vulnerabilities, Zero Days
09 05, 14
Quoted in CSO on the high rate of malware infections:
Read More... Tags: Malware, Detection and Response
30 04, 14
Quoted in USA today on Microsoft’s workaround for the zero-day vulnerability in Internet Explorer:
Read More... Tags: Microsoft, Vulnerabilities, Windows XP, Zero Days
28 04, 14
Quoted in CRN on a new zero-day vulnerability in Internet Explorer:
Read More... Tags: Microsoft, Vulnerabilities, Windows XP, Zero Days, Flash
16 04, 14
Quoted in CSO on techniques to more accurately simulate real-world attacks including combining network and application hacking with phishing, social engineering, and physical infiltration:
Read More... Tags: Penetration Testing, Social Engineering, Phishing, Physical Infiltration
11 04, 14
Quoted in Wall Street and Tech on the increasing use of dating sites for phishing, spam, fraud, and other attacks:
Read More... Tags: Malware, Social Engineering, Phishing, Fraud
17 03, 14
Quoted in Wall Street and Tech on evolving Distributed Denial of Service attacks:
Read More... Tags: DDoS
08 03, 14
Quoted in CSO on the lessons to be learned from the Navy breach
Read More... Tags: Breaches
04 03, 14
Quoted in CIO on disaster readiness
Read More... Tags: Disaster Readiness
04 03, 14
Quoted in NBC News on DDoS blackmail
Read More... Tags: DDoS
12 01, 14
Quoted in CSO on the changes in PCI DSS version 3.0
Read More... Tags: PCI Compliance
10 01, 14
Quoted in USA Today on suggestions for Target customers affected by the breach.
Read More... Tags: Target Breach, PCI Compliance, Breaches
10 01, 14
Quoted in CNN Money on suggestions for individuals affected by the Target breach
Read More... Tags: Target Breach, PCI Compliance, Breaches
10 01, 14
Quoted in NBC News on the implications of the Target breach
Read More... Tags: Target Breach, PCI Compliance, Breaches
10 01, 14
Quoted in CSO on new revelations of data compromised in the Target breach
Read More... Tags: Target Breach, PCI Compliance, Breaches
23 12, 13
Quoted in CRN on addressing the risks of insider threats
Read More... Tags: Inside Threats, Snowden Leaks
19 12, 13
Quoted in CRN on advising companies to use risk-based security to mitigate the threat of breaches similar to Target’s recent exposure
Read More... Tags: Target Breach, PCI Compliance, Breaches
12 12, 13
Quoted in CRN on the value of risk assessments in security
Read More... Tags: Risk-Based Security
10 12, 13
Quoted in CRN on critical Microsoft security flaws
Read More... Tags: Microsoft
01 08, 13
Quoted in CRN on techniques to bypass cloud-based DDoS protection services
Read More... Tags: Cloud Security, DDoS
31 07, 13
Quoted in Network Computing on the growing size of DDoS attacks
Read More... Tags: DDoS
29 07, 13
Quoted in CRN on the “bring your own device” phenomenon driving interest in network access control technologies for network security.
Read More... Tags: BYOD, Mobile Device Security
19 06, 13
Quoted in CRN on Microsoft’s initial foray into bug bounty programs
Read More... Tags: Microsoft
31 05, 13
Quoted in CRN on techniques to avoid password theft
Read More...