Those who fail to learn the lessons of history are destined to repeat them. Don’t be that organization… Back in September of 2017, Avast indicated that the network of its recently acquired (July 2017) subsidiary had been infiltrated, and that its CCleaner...
A few weeks ago, I read an article that provided significant insight into the Spy vs Spy battles between the Unites States and Russia. Title: Russia carried out a ‘stunning’ breach of FBI communications system, escalating the spy game on U.S. soil It was...
A holistic approach to information security needs to address a corporate strategy for buying or building solutions. Such a strategy will have an impact on how a company looks at staffing and technology investments. There are two basic ways to look at major investments...
In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased number of attacks. Not incidentally, mobile devices just flew off the shelves this year,...
Based on a number of surveys taken since the recent economic downturn began, it would appear that there is a fairly substantial disconnect between how employers and employees view the job market and the joys of employment. Within the past two years, many business...