Your Email Security Toolbox: Defense in Depth
Criminals know that easily-obtained data can help them craft a compelling attack campaign. Here are some essential tools defenders must have to thwart these sophisticated attacks.
Don’t Feed the Phish: Implementing DMARC
The Challenge of implementing SPF and DKIM: It’s no surprise that email authentication standards such as Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) have not...
Why phishing attacks still win and what you can do about it, Part I
In the last few years we have seen a fundamental shift in cybercriminal tactics leveraging social engineering techniques. Among the most effective of these techniques are phishing attacks, where cybercriminals...
The IoT(s): One Size Does Not Fit All
Today let’s talk about IoT as a plurality. I suspect that you may have recently heard the phrase that “words matter,” and when talking about something as broad and diverse as “IoT” it really does indeed matter. It matters because correctly defining what you are speaking about, and to whom, will help to drive towards […]
Welcome to the OT World
It may have come to you in an email or perhaps during a 1:1 with your boss but either way the news probably caught you by surprise. You will be taking your security skills to the industrial side of the house. Congratulations! And good luck – you are going to need it. Much of what […]
Trends in Data Center Security: Part 1 – Traffic Trends
Organizations are quickly discovering that a “one size fits all” approach to security across the network falls short of addressing the unique trends in the Data Center. So what’s really that unique about the Data Center (DC)? This is a multi-part blog to highlight various trends related to securing the DC, with Part One focusing […]