Phishing

Coronavirus pandemic COVID-19 zero trust data masking

Defense in Depth at the Identity Perimeter to Mitigate Coronavirus Social Engineering Risk

The rapid acceleration from on-location to remote workforce as part of the Coronavirus Pandemic response opened the door to malicious actors accelerating their phishing and social engineering attacks. Cybercriminals prey on user anxiety by embedding malicious files in COVID-19 themed […]

Defense in Depth at the Identity Perimeter to Mitigate Coronavirus Social Engineering Risk Read More »

ransomware targeted attacks privilege interaction

Exposing Targeted Attacks by Observing Privilege Interactions Between Entities

In May 2019, most of Baltimore’s government computer systems were infected with a new and aggressive ransomware variant named RobbinHood. All servers, with the exception of essential services, were taken offline as a result of targeted attacks. In a ransom

Exposing Targeted Attacks by Observing Privilege Interactions Between Entities Read More »

machine learning artificial intelligence BlackBerry Intelligent Security Cylance

BlackBerry’s AI Intelligent Security Has Broad Implications

I’ve been working in and out of security and law enforcement for much of my life. The biggest exposures I’ve run into and the easiest ways through security have always been through the employee. Whether it was a disgruntled employee

BlackBerry’s AI Intelligent Security Has Broad Implications Read More »

BlackBerry Spark mobile security

BlackBerry Massively Steps Up Security Efforts to Address Threat Storm

BlackBerry continues to execute on their pivot to become a software, services, and device security firm. This doesn’t mean they don’t still have interesting smartphones, their licensed Key2 phone is arguably one of the most impressive secure phones currently in

BlackBerry Massively Steps Up Security Efforts to Address Threat Storm Read More »

Scroll to Top