Archive for Recent Industry News


1. Your own security team is overworked and can’t get to it.
2. You want an objective, 3rd party view of how vulnerable your organization is to cyber threats.
3. You want to know how diligent the security efforts are of a prospective supplier, merger partner, or acquisition target before you provide them access to your network.
4. You want to avoid the downtime, forensic analysis, loss of reputation, and potential lawsuit that could come from data security negligence.
5. You want an advantage over key competitors.

Make Sure You Delete All Data from Unused Phones, Tablets, Laptops, or Computers

How PayPal is Being Used for Phishing Scams

Understanding Vulnerability Scoring and How to Differentiate Vulnerability From Risk

Business Email Compromise Attacks are Moving to Mobile Devices

Extending Wireless Networking to Cars Creates New Cyber Risks

UT Dallas Cybersecurity 2019 Kickoff Event

UTD Cybersecurity Invite

Many thanks to UT Dallas for inviting me to speak at their 2019 Cybersecurity Kickoff event. Graduates from cybersecurity programs like UTD’s are helping to close the skills gap, which is expected to reach 3.5M open positions by 2021.

7 out of 10 organizations say their security risk increased significantly in 2017

Cybersecurity continues to be a growing priority for organizations of all sizes, across all industries. See how the latest stats and trends are shaping plans, spending, and priorities for 2018.

Top Ten Cybersecurity Tips For Businesses in 2018

This article originally posted by Oberveit on January 12th, 2018 gives a fresh outlook on the current year cyber threat landscape.

Checklist for Security Best Practices

This posting from MicroSoft is a little dated now, but includes some good strategy tips and best practices to secure infrastructure and communications, and to increase the likelihood of maintaining business continuity.