
Romance Scams: The cybercrime that just won’t go away
Romance scams often lead to victim blaming. What can we do to avoid them, and to keep our own vulnerable friends and family safe?

Romance scams often lead to victim blaming. What can we do to avoid them, and to keep our own vulnerable friends and family safe?

The cybersecurity vendor market is quite complicated and it’s easy to get lost in the acronym soup. Whether it’s to make their product sound different or just the proclivity of the tech industry to abbreviate everything, it can be incredibly challenging for non-security people to understand what’s important and what isn’t. Making matters worse, many of the services overlap, meaning that you can invest in two “different” services or platforms and end up getting the same thing in both. One […]

Startup valuations are the scoreboard of success, and the podium for winners is Unicorn Status—when a company reaches a valuation of $1 billion. Achieving unicorn status is the dream of any startup, and it typically signals the startup’s strong potential to either go through an IPO or become acquired by a larger firm in an M&A deal. A start-up achieves unicorn status if: Unfortunately, because it might have vulnerabilities that more established, public companies don’t, achieving unicorn status also puts […]

What if we look beyond cybersecurity automation and algorithms?
What if we start out with a focus on cybersecurity culture, not on rules and rote?

Has encryption given us a false sense of security by luring us into assuming that if our data is safe a lot of the time, we can act as though it is safe all of the time?

What if we all adopted a cybersecurity culture anchored in value and quality, instead of a race-to-the-bottom predicated on cheapness and quantity?

What if we all adopted a cybersecurity culture anchored in value and quality, instead of a race-to-the-bottom predicated on cheapness and quantity?

If HTTPS provides true end-to-end encryption, how do web firewalls crack into your network traffic? And what stops cybercriminals doing the same thing?

Some cybercriminals don’t probe your network to unleash a ransomware attack. Some of them just want login secrets to sell on for the next wave of cybercriminality.

Does the cybersecurity industry really need as much esoteric jargon and as many complex components as it has?
Or is the burden of “more tools, more tools” weighing us down?

All the cybersecurity experts and vendors in the world failed to stop the SolarWinds attack. It’s often the fluency and completeness of how you respond to the news that really matters…

When cybercriminals are around, what you see at the outset is rarely what you get in the end.

The financial services industry has historically been one of the most targeted industries for cyberattacks, and it’s not difficult to imagine why. Roughly 95% of attacks are financially motivated, and hackers are going directly to the source by targeting the financial services sector. Not only do these financial institutions have direct access to cash, they also tend to be high-revenue businesses that can’t afford to be disrupted or take a reputational hit, so they’re more likely to pay a ransom. […]

Here’s a gentle, objective, and not-too-technical retrospective. Are you sitting comfortably?

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






