As parents, we want to provide our children with the best of everything. We know, as they grow, they will develop specific skills and hone talents for what soon may be their calling in life. As a mother and a technology professional, I have a passion for the tech industry which may or may not […]

This is the third of four-part blog series on the IT security inflection point. In my first two blogs in this series I wrote about the imperative for us all to change how we deliver value to our mutual customers. We need to move from selling products to focusing on business outcomes. We need to […]

Imagine that you want to pull up a certain file on your computer. You click on the file and suddenly a notice flashes on your screen saying your computer has been compromised and in order to get your files back, you need to pay up some money. This, ladies and gentlemen, is ransomware, a nasty […]

Adobe Flash vulnerabilities and exploits have worried users and security professionals for many years. The situation today remains serious. A quick search of the National Vulnerability Database shows 277 vulnerabilities reported in Flash Player since 2011. For Flash zero-day attacks (which means that there was no patch from Adobe when the vulnerability was exploited), researcher […]

originally posted to Dark Reading:  Intel Security Perspectives What too many of the year’s high-profile data breaches had in common. The only thing more depressing than the increasing frequency and growing scale of the cyber attacks in this year’s headlines was the consistency of key attributes across so many of the events. From the retailer […]