Vulnerability management today is a key process in any security program and regulatory compliance framework. With the growing amount of data breaches and...
I have a friend who manages a large financial investment company based in NJ and each year, sometimes twice a year, he ...
I have a friend who manages a large financial investment company based in NJ and each year, sometimes twice a year, he ...
Think like a hacker. It seems so obvious but you might be surprised to hear that most cyber security professionals were ...
Think like a hacker. It seems so obvious but you might be surprised to hear that most cyber security professionals were ...
In cyber warfare, like in chess, the game outcome is not determined by a single exploit (or move), but rather by a ...
In cyber warfare, like in chess, the game outcome is not determined by a single exploit (or move), but rather by a ...
“He shoots, he scores!” I still hear the sports announcer’s excitement coming across the loudspeaker -- in my high
01.29.2019
I’m one of those managers who can’t sit in the office for more than a few days. I travel the world and constantly meet
01.29.2019
As people, we make do with what we have, but once a better tool is within our reach we adopt it without looking back.
01.29.2019
I build penetration testing software for a living. That means, businesses give our software a 007 license to hack and
01.29.2019
In cyber warfare, like in chess, the game outcome is not determined by a single exploit (or move), but rather by a
01.14.2019