I cannot speak to the webinar this article speaks to, but the premise is very intriguing. I do believe organizations should work under the assumption that they are under attack and they are already breached. Every organization should ask the question, “How do we defend what is important to us (data) once the walls have fallen and the gates are breached?”
top of page
Recent Posts
See AllI recently spoke about the FTC’s lawsuit against Chegg, a major education tech firm, in one of the weekly tech tips interviews I provide...
Multiple sources have reported the breach of Cisco’s own network, purportedly via a Cisco employee’s personal Google account. According...
I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and...
bottom of page