
A guest writer of WEI, see Bill Frank’s biography and contact information at the end of this article. Michael Lewis coined the term, Moneyball, in his eponymous book published in…
A guest writer of WEI, see Bill Frank’s biography and contact information at the end of this article. Michael Lewis coined the term, Moneyball, in his eponymous book published in…
The goal of every security organization is to protect its data. This mission has become increasingly complex in the face of an expanding attack surface and increasingly sophisticated and frequent…
See Bill Frank’s biography and contact information at the end of this article. [Note: This is an updated version of the original article posted on March 21, 2024. I replaced…
This is the first installment of a two-part series dissecting the Left of Bang strategy and mindset and how it applies to modern cybersecurity practices. Click here to read part…
Email is a vital part of our lives, both for business and personal communications. However, this integral tool is increasingly vulnerable to malicious attacks by cybercriminals aiming to steal credentials,…
Over the last decade, the topic of cybersecurity has shifted from being a technical subject to a mainstream topic impacting every facet of the organization. As cyberattacks become increasingly more…
Regardless of the subject, there’s no one better to learn from than the experts. With this thought in mind, we recently held a cybersecurity webinar featuring Kevin Mitnick, a famous…
In the last six months, the fear of cyberattacks has grown significantly, largely due to several high-profile incidents that left enterprises struggling to deal with the fall out and the…
Networks continue to grow in both size and complexity. Enterprises need modern security solutions that better protect their network traffic. Many organizations are retiring their traditional firewalls to implement next-generation…