Blog

A perspective on next generation cybersecurity, vulnerabilities, and the cloud.
In September 2017, Wired reported that hackers had gained access to multiple electrical power facilities in the U.S. Conceivably, the hackers could have shut...
In one of the most ironic pieces of cyber security news in recent months, Taiwanese police inadvertently gave out USB drives containing malware as prizes for...
In early December 2017, OPSWAT announced that OpenDocument Text files are supported in MetaDefender for data sanitization (CDR). Data sanitization, or...
Despite an increased focus on cyber security in recent years, the number of data breaches continues to rise. As enterprises focus more (and spend more) on...
In the mid-2000s, network access control (NAC) became the accepted solution for on-premises networks. NAC restricted access for devices that did not comply...
This year my colleagues and I were onsite for the first Nuclear Regulatory Commission cyber security program Milestone 8 inspections at the South Texas...
Instead of purchasing the widely used Microsoft Office suite, many users opt to use the free alternatives LibreOffice or Apache OpenOffice. However, these...

Sign up for Blog updates

Get information and insight from the leaders in advanced threat prevention.