From Breach to Recovery: Designing an Identity-Focused Incident Response Playbook
Imagine this… You arrive at work to a chaotic scene. Systems are down, panic is in the air. The culprit?…
Identity illuminated
Imagine this… You arrive at work to a chaotic scene. Systems are down, panic is in the air. The culprit?…
Apple has filed a motion to “voluntarily” dismiss its lawsuit against commercial spyware vendor NSO Group, citing a shifting risk…
Cybersecurity researchers have warned of ongoing phishing campaigns that abuse refresh entries in HTTP headers to deliver spoofed email login…
This is a current list of where and when I am scheduled to speak: I’m speaking at eCrime 2024 in…
Post Content Read More
Post Content Read More
Ivanti has revealed that a newly patched security flaw in its Cloud Service Appliance (CSA) has come under active exploitation…
This is an odd story of serving squid during legislative negotiations in the Philippines. This is an odd story of…
The incident is a reminder why organizations need to pay attention to how they store and secure data in SaaS…
In this case study, a CISO helps a B2B marketing automation company straighten out its manual compliance process by automating…