Author: Richard Henderson

The current state of malware is a conflicted one. On the one hand, data breaches involving malware have become less frequent in recent years. In its 2019 Data Breach Investigations Report (DBIR), Verizon found that malware had been active in 28 percent of data breaches...

We’re inclined to focus only on digital threats that emanate from outside the network. In so doing, however, we overlook a key risk: threats that come from within the network itself. I’ll use this blog post to discuss what these “insider threats” look like, what types...

When we think of a digital attack, I think many of us go straight to attack campaigns that involve exploiting application or operating system vulnerabilities. Not all attacks involve these, of course. There are plenty of attacks that solely leverage social engineering tactics to undermine...

"Ever wonder how technology professionals manage to keep up with the ever-changing world of IT? It’s mind boggling really. Whatever the future brings, IT pros always find a way to make it work. Not a minute passes when organizations and end users don’t benefit from...