Large tech and social media companies often share user data with other businesses for marketing purposes. In recent history, there have been many publicized breaches and other security incidents involving the personally identifiable information (PII) stored by these companies. This only creates a perfect storm for more breaches. Enterprises that…
Read More
There’s some confusion in the security industry between the terms “red teaming” and “penetration testing.” This blog post will discuss how the confusion may have come to be and provide a breakdown of some of the differences between the two exercises. It will also discuss which business challenges align with…
Read More
As I anxiously awaited the last season of “Game of Thrones,” I found myself thinking about my favorite character from the series: the assassin who belongs to the mysterious cult of “Faceless Men.” Specifically, I thought about his ability to change his face and appearance at will, and how this…
Read More
Every once in a while, a new technology is unleashed that changes our lives. The wheel, the steam engine and the internet are just some examples that had a profound effect. 5G could be the latest to do the same. Its rollout will forever change how we manage mobile security,…
Read More