Anyone who hoped 2019 would bring a break in the pattern of rising data breach risks will be disappointed to learn that the first quarter of this year set new records in the worst way. A recent TechRepublic article notes “a record-breaking number of data breaches that exposed billions of documents to theft” — the […]
Read More ›There’s a pervasive, false perception in contemporary politics. The candidate that advocates spending the most on something cares most about solving the problem. Today’s endpoint protection suites are similarly ranked. Those with the longer list of features are ranked higher. Similarly, like features are seldom compared one-to-one but are presumed little different among different suites. […]
Read More ›One of today’s most widespread cybersecurity principles seems prudent on the surface but has made the enterprise cyber program a bloated, lumbering beast of burden. Defense in depth is simple to intuit; it is as obvious as two heads are better than one. Reality demands, however, that the enterprise optimize. How many are too many? […]
Read More ›