Honored to have had the privilege to write the forward to the third book of Morey Haber‘s trilogy of enterprise attack vectors. This installment, written with Darran Rolls, discusses the…
The move to a segmented infrastructure is not a revolutionary effort, its an evolutionary one. The slow, steady migration to segmentation is the only realistic path to success. Networking teams…
In an era of enterprise mobility, employee flexibility and convenience in terms of working from remote locations and device usage has become a new norm. Although this definitely adds to…
The time is now to start a cybersecurity career, as the need is more urgent than ever Cyberattacks happen every day to all types of businesses and organizations. That’s why…
Identity Attack Vectors, by Haber and Rolls
Honored to have had the privilege to write the forward to the third book of Morey Haber‘s trilogy of enterprise attack vectors. This installment, written with Darran Rolls, discusses the…
Few Firms Use Segmentation, Despite Security Benefits
The move to a segmented infrastructure is not a revolutionary effort, its an evolutionary one. The slow, steady migration to segmentation is the only realistic path to success. Networking teams…
5G technology predictions 2020
Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020 Cybersecurity of connected healthcare 2020: Overview and predictions Corporate security prediction 2020 Cyberthreats to financial institutions 2020: Overview and predictions It…
Information Security: Corporate-Owned Devices Vs Employee-Owned Devices
In an era of enterprise mobility, employee flexibility and convenience in terms of working from remote locations and device usage has become a new norm. Although this definitely adds to…
Cybersecurity Career Path: A Beginner’s Guide
The time is now to start a cybersecurity career, as the need is more urgent than ever Cyberattacks happen every day to all types of businesses and organizations. That’s why…