Egress filtering is something that every company should be doing. Do you know what is exiting your company? Now, the obvious questions would turn to credit card numbers, intellectual property and so forth. But, what about command and control communication
Often, the most vulnerable part of any cybersecurity regime is the “device between the keyboard and the seat,” i.e. the human. To continue the benefits of our networked society, we need more effective approaches to cybersecurity. Addressing the human
After a slew of major security breaches, the time is ripe for a new way of thinking about cybercrime, data breaches and security. Blockchain, with a number of new companies coming to the fore, might be the answer amid the trustworthiness of some security
While a multi-cloud strategy provides for more flexibility, resiliency and reduced dependence, there is also the risk of unfettered sprawl -- which cloud computing was supposed to fix in the first place.