Software security is an important concern for vendors, consumers, and regulators since attackers who exploit vulnerabilities can cause significant damage. In this brief paper, I discuss key themes in ...
1. Hostile cyber operations by one state against another state are increasingly common. It is estimated that over 22 states are responsible for sponsoring cyber operations that target other states, ...
For years, security professionals have been saying “either you have been data breached or you just do not know that you have been data breached.” Data breaches are now a fact of life together with ...
Did you know that October is European Cyber Security month? Across the continent, 365 activities are taking place throughout the month to raise awareness of cyber security threats, promote cyber ...
Introduction: Why MSSPs Need a New Security Backbone Managed Security Service Providers (MSSPs) are operating in one of the most demanding environments in cybersecurity today. They are expected to ...
In 2025, NATO member states moved decisively to expand their cyber posture beyond protection. One of the clearest signals ...
Image — A board used to represent elements of infrastructure of the fictitious country being targeted during the Locked Shields NATO exercise in Tallinn, Estonia ...