Elsewhere

2017-01-20: Finding your ideal endpoint protection—next-gen or otherwise—to achieve prevention, detection and response, SC Magazine

2016-12-22: Sing a song of ransomware, Naked Security

2016-11-16: What is next-gen endpoint protection, anyway?, SC Magazine

2015-12-23: Holiday security song #3: Ransomware, Sophos Blog

2015-12-22: Holiday security song #2: My least favorite things, Sophos Blog

2015-12-21: A security song for the holidays: Over the network and through the cloud, Sophos Blog

2015-02-17: Why Security is Failing in Organisations Today, CIO Asia

2014-08-07: 3 Places to Enable 2-Factor Authentication Now, Dark Reading

2014-07-07: Microsoft, No-IP, and the Need for Clarity, Dark Reading

2014-06-04: Back to Basics, Dark Reading

2014-02-27: Preying on a Predator, Dark Reading

2013-12-31: When Websites Attack, Dark Reading

2013-12-20: Update Now! – A Holiday Carol, Dark Reading

2013-12-05: The Dinosaur in the Room, Dark Reading

2013-10-17: With Shared Power Comes Shared Responsibility, Dark Reading

2013-09-25: The New KISS Rule: Keep Information Security Simple, Dark Reading

2013-09-10: How to train your users, Dark Reading

2013-08-16: Wait, what? Twitter is a terrorist?, Naked Security

2013-08-13: The More Things Change, Dark Reading

2013-07-31: Has Chrome struck security gold?, Dark Reading

2013-07-17: Forget Standardization. Embrace BYOD., Dark Reading

2012-12-21: Grandma Got Infected by a Trojan, StopBadware Blog

2011-12-23: A Nightmare Before Christmas, StopBadware Blog

2011-02-12: ‘Night Dragon’ attacks: Another reason to care about consumer malware, ZDNet

2008-07-09: The key to an open, transparent malware filtering system, ZDNet

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s