St Louis, MO, USA
He has had several editorial management positions for both print and online properties in the enthusiast, gaming, IT, network, channel, and electronics industries, including the editor-in-chief of Network Computing print, Digital Landing.com, and Tom's Hardware.com. He currently writes for PC Magazine, Slashdot, Computerworld, Techtarget and Network World.
New regulations and a changing threat landscape mean you need a different approach to your security risk assessment process.
PowerShell is a powerful and versatile tool for both Windows sysadmins and hackers, who use it to build malicious scripts that avoid detection. This advice will make it harder for them to do so.
Commercial and open source honeypot tools are now effective deception solutions. Here's what you need to know before implement them.
Any of these tools from Endgame, Red Canary, Mitre, and Uber will get your red team and pentesters started with Mitre's ATT&CK framework.
The ATT&CK framework allows security researchers and red teams to better understand hacker threats.
RSA’s Anti-Fraud Command Center helps financial services firms stay a step ahead of fraudsters and criminals. The ultimate goal: Someday make it not worth their effort to even try.
Running your own CTF contest can build security skills and help identify new internal and external talent. Learn what types of challenges you need to include, how to make the contest run smoothly, and other logistics to consider.
A new generation of risk-based authentication (RBA) products can improve both customer experience and security. Here's what to look for in them.
Cloud access security brokers have come a long way in a few years and can be an effective way to manage authentication and encryption across cloud and on-premise systems.
First in a series of articles on the best ways to deploy and secure smart home technology.