The Ethical Hacker: Best Defense for Today's Ransomware? Basic IT
I’ve been fairly consistent in my opinions, and I hope my viewpoints are well known by now. People, process and policy are the ways to...
The Ethical Hacker: Technically Speaking, Cybersecurity Isn’t About Speaking Technically
These days cybersecurity seems to be all about technology. Pen testing, firewalls, port scanning, SIEM, zero-day, IPS, AES256, SHA, DMZ,...
Field Notes: Your Small Business Isn't Immune
Small businesses aren't immune to cyber attacks. In fact, they may be more vulnerable and at risk than their larger counterparts who ha
Field Notes: Leveraging IoT Data Isn’t a Budget Killer
Like many, I attended LegalTech Jan. 31 – Feb. 2 and enjoyed catching up with old friends while seeing new, emerging technologies. Did...
The Ethical Hacker: I Got 99 Problems, But No Data Ain’t One
A few weeks ago, I was lucky enough to meet with some senior in-house counsel from a Fortune 10 company. We were discussing data and the...
The Ethical Hacker: Are You Accounting for One of Your Largest Cybersecurity Risks?
I’ve written on this topic before, and despite the danger of sounding like a broken record, I will repeat myself: Cybersecurity is all...
Field Notes: Employee Departures
It’s Friday afternoon and the conversation goes a little like this, “Wait, what? They’re leaving? Where are they going? Is there any...
Field Notes: Shadow IT
The Cloud is everywhere we turn these days. If you haven’t seen or read an article in the last year about what it is, why you should...
Field Notes: How to Protect Yourself from Ransomware Attacks
Ransomware. Just the word itself is enough to chill the hearts of everyone from personal users to corporate IT and senior executives....