Latest news & articles

The Cyber Kill Chain or: how I learned to stop worrying and love data breaches

Pulling off a heist is no easy feat – and in order to prevent theft, you best understand the plan…

By July 22, 2016

The Pyramid of Pain

To illustrate this concept, I have created what I like to call the Pyramid of Pain.  This simple diagram shows…

By July 22, 2016

The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges

If you always do what you’ve always done, you’ll always get what you’ve always got.” This kernel of wisdom comes…

By July 22, 2016

The Security Cost of Free Smartphone Apps

There are hundreds of thousands of them to choose from now whether you have an iPhone, an Android or some…

By July 6, 2016

Russian Threat Group Targets Clinton Campaign

Governments like to know what the leaders of rival countries are really thinking. To answer these questions, they may turn…

By June 16, 2016

Best Practices for Confidence in the Cloud

Until recently, most cloud migration decisions were made without the benefit of the CISO's guidance. In an effort to take…

By June 13, 2016

Malware Lingers with BITS

Threat actors leveraged a “notification” feature in the Windows Background Intelligent Transfer Service (BITS) to download malware. In May 2016,…

By June 6, 2016