Pages

Categories

Search

 

Posts Tagged: Company

By John Scott Cyber has been called the ultimate team sport: CIOs, CTOs, SysAdmins, Software Developers, CISOs, threat teams, red teams, testing groups, etc. etc, but really should it be? It seems more like a jobs program that moves headcount from one part of the enterprise to the expensive nerdy-si...

By John Scott For Want of a Patch For want of a patch the component was lost. For want of a component the stack was lost. For want of a stack the system was lost. For want of a system the message was lost. For want of a message the cyberbattle was lost. For want of a battle […]...

The list of corporations affected by data breaches in 2014 continues to lengthen. UPS announced a breach a few weeks ago; eBay announced a breach in the Spring, and we still have not heard the last of the breach that affected Target at the end of last year. Brian Krebs’s cybersecurity blog Krebson...

Data breaches have captured the attention of the American media several times this year. The compromise of Target’s systems and the resulting media coverage cost the corporation hundreds of millions of dollars in the first half of 2014, and the repercussions are far from over. In a recent report, ...

Palo Alto Networks protects thousands of enterprise and governments from cyber threats. They rely on a deep expertise and commitment to innovation to continually enhance their game-changing security platform. The Palo Alto Networks security platform natively brings together all key network security ...

Palo Alto Networks protects thousands of enterprise and governments from cyber threats. They rely on a deep expertise and commitment to innovation to continually enhance their game-changing security platform. The Palo Alto Networks security platform natively brings together all key network security ...