St Louis, MO, USA
He has had several editorial management positions for both print and online properties in the enthusiast, gaming, IT, network, channel, and electronics industries, including the editor-in-chief of Network Computing print, Digital Landing.com, and Tom's Hardware.com. He currently writes for PC Magazine, Slashdot, Computerworld, Techtarget and Network World.
The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.
Rhino Security and Amazon offer tools to improve visibility into your AWS cloud environments, making it easier to find configuration errors and vulnerabilities.
New regulations and a changing threat landscape mean you need a different approach to your security risk assessment process.
PowerShell is a powerful and versatile tool for both Windows sysadmins and hackers, who use it to build malicious scripts that avoid detection. This advice will make it harder for them to do so.
Commercial and open source honeypot tools are now effective deception solutions. Here's what you need to know before implement them.
Any of these tools from Endgame, Red Canary, Mitre, and Uber will get your red team and pentesters started with Mitre's ATT&CK framework.
The ATT&CK framework allows security researchers and red teams to better understand hacker threats.
RSA’s Anti-Fraud Command Center helps financial services firms stay a step ahead of fraudsters and criminals. The ultimate goal: Someday make it not worth their effort to even try.
Running your own CTF contest can build security skills and help identify new internal and external talent. Learn what types of challenges you need to include, how to make the contest run smoothly, and other logistics to consider.
A new generation of risk-based authentication (RBA) products can improve both customer experience and security. Here's what to look for in them.