Elsewhere

2017-01-20: Finding your ideal endpoint protection—next-gen or otherwise—to achieve prevention, detection and response, SC Magazine

2016-12-22: Sing a song of ransomware, Naked Security

2016-11-16: What is next-gen endpoint protection, anyway?, SC Magazine

2015-02-17: Why Security is Failing in Organisations Today, CIO Asia

2014-08-07: 3 Places to Enable 2-Factor Authentication Now, Dark Reading

2014-07-07: Microsoft, No-IP, and the Need for Clarity, Dark Reading

2014-06-04: Back to Basics, Dark Reading

2014-02-27: Preying on a Predator, Dark Reading

2013-12-31: When Websites Attack, Dark Reading

2013-12-20: Update Now! – A Holiday Carol, Dark Reading

2013-12-05: The Dinosaur in the Room, Dark Reading

2013-10-17: With Shared Power Comes Shared Responsibility, Dark Reading

2013-09-25: The New KISS Rule: Keep Information Security Simple, Dark Reading

2013-09-10: How to train your users, Dark Reading

2013-08-16: Wait, what? Twitter is a terrorist?, Naked Security

2013-08-13: The More Things Change, Dark Reading

2013-07-31: Has Chrome struck security gold?, Dark Reading

2013-07-17: Forget Standardization. Embrace BYOD., Dark Reading

2012-12-21: Grandma Got Infected by a Trojan, StopBadware Blog

2011-12-23: A Nightmare Before Christmas, StopBadware Blog

2011-02-12: ‘Night Dragon’ attacks: Another reason to care about consumer malware, ZDNet

2008-07-09: The key to an open, transparent malware filtering system, ZDNet

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s