2015 was an especially devastating year for healthcare in terms of data breaches. The Anthem breach exposed a staggering 78.8...
Year: 2016
We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We have more...
Exploit Kits (EK), arguably the most impactful malicious infrastructure on the Internet, constantly evolve to evade detection by security technology....
The number and severity of cyber threats in the United States are on the rise, and a new voluntary program...
Managers are obsolete. Mentors are a thing – or should be! Fortune magazine suggests that companies retire the term ”manager.”...