Technology
After being hands-on in many areas of security and IT, I now focus on strategy and leadership, treating security as an enabler that helps people and companies achieve their goals.
Cybersecurity leaders not only go against threat actors to defend the organization but also find themselves at odds with...Read more
10 years after the initial release of REMnux, I'm thrilled to announce that REMnux version 7 is now available. This Linux...Read more
In June 2020, the Federal Trade Commission (FTC) warned that "imposters are filing claims for unemployment benefits [in the...Read more
I'm drawn to large-scale problems, I guess:At the onset of cloud computing, I was helping companies benefit from cloud...Read more
Political campaigns are targets of cybercriminals and nation-state adversaries, who possess formidable persistence and...Read more
If you'd like to start experimenting with malware analysis in your own lab, here's how to download and set up a free...Read more
Microsoft is no longer content to simply delegate endpoint security on Windows to other software vendors. The company...Read more
Scammers use a variety of social engineering tactics when persuading victims to follow the desired course of action. One...Read more
This cheat sheet offers guidelines for IT professionals seeking to improve technical writing skills. To print it, use the...Read more
Is it better to perform product management of information security solutions at a large company or at a startup? Picking the...Read more