When you are building an Information Security practice you need a solid governance structure in place. For those of you who might not be familiar…
Doxing and ransomware were unfortunate bedfellows this weekend when we saw the unnecessary doxing of a researcher during the massive WannaCry ransomware outbreak. I'm pissed…
Malware Targets Hillary-Haters With False Promise of Video Showing ISIS Payoff (Forbes) Malware pushers know that when they launch a campaign against overzealous link clickers,…
The state of vulnerability disclosure took a weird turn last week after short-selling firm Muddy Waters disclosed alleged security holes in pacemakers and defibrillators produced by…
This was originally published in my other blog, The OCD Diaries. I'm cross posting here because the content is relevant to Liquidmatrix readers. In pretty…
Some of you asked why I don’t write as much as I used to. Partial answer: My real job and a lot of family business…
Some industry friends are busy organizing the O'Reilly Security Conference, which will cover everything from how to defend against malware, spear-phishers and DDoS attacks to managing those challenges…
Attention, security professionals in Southern California: If you want to hear some high-value talks, the next ISSA-LA (Information Systems Security Association) Summit is May 20 at…
As I write this on a peaceful Palm Sunday afternoon, my Facebook feed is ablaze with outrage over a keynote Lookout Co-Founder and CTO Kevin Mahaffey gave…
The press Trend Micro is getting for its research on the hacking of sex toys reminds me of a podcast recording I did a couple years…