Charles McFarland was a coauthor of this blog.
Over the course of Friday, May 12 we received multiple reports of organizations across multiple verticals being victim to a ransomware attack. B
Category: business
Following recent WikiLeaks Vault 7 disclosures, including details regarding firmware vulnerabilities, there has been significant concern regarding the integrity of devices and operating systems use
Improving the Lifecycle of Threat Defense Effectiveness
When a new security tool or technique is released, Version 1.0 is usually pretty effective, and successive versions get even better wit
Threats, Regulations, and Vendor Responses to Risks in the Internet of Things
The Wild West, a place of exaggerated lawlessness in the United States during the 1800s, has returned once again