"Risks have evolved, We haven't While we stabilize toward checkbox compliance, adversaries and IT accelerate onward, Adversaries know you're compliant---and do not care---they're counting on it. Let'
Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses the dangers associated with relying on historical data, security incident reports, and network analysis to predict future secu
Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people devote hours to develop malware around the world. The root cause analysis of the monetization of cyberse