From Breach to Recovery: Designing an Identity-Focused Incident Response Playbook
Imagine this… You arrive at work to a chaotic scene. Systems are down, panic is in the air. The culprit?…
Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure
Apple has filed a motion to “voluntarily” dismiss its lawsuit against commercial spyware vendor NSO Group, citing a shifting risk…
Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacks
Cybersecurity researchers have warned of ongoing phishing campaigns that abuse refresh entries in HTTP headers to deliver spoofed email login…
Upcoming Speaking Engagements
This is a current list of where and when I am scheduled to speak: I’m speaking at eCrime 2024 in…
South Korea Digital Forensics Market to Hit US $3.52B by 2031
Post Content Read More
Cybersecurity Community Celebrates Documentary Premiere at Tampa Theatre
Post Content Read More
Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability
Ivanti has revealed that a newly patched security flaw in its Cloud Service Appliance (CSA) has come under active exploitation…
Friday Squid Blogging: Squid as a Legislative Negotiating Tactic
This is an odd story of serving squid during legislative negotiations in the Philippines. This is an odd story of…