More than ever, enterprises require intelligent, integrated solutions to prevent data theft and network disruption caused by stealthy, targeted attacks. Despite what many vendors would have you believe, there is no one product or ‘silver bullet' to solve this problem.

Read more

Information is eternal, computers are ephemeral, backup is the savior.

Read more

Being able to break security doesn’t make you a hacker anymore than being able to hotwire cars makes you an automotive engineer.

Read more

Why did I decide to write cyber thrillers? Because we've gone from the Cold War to the Code War.

Read more

You can't hold firewalls and intrusion detection systems accountable. You can only hold people accountable.

Read more

A computer lets you make more mistakes faster than any invention in human history – with the possible exceptions of handguns and tequila.

Read more

Recommended addition to the Consumer Privacy Bill of Rights: A right to not have your data rise up and attack you.

Read more

Eighty percent of the intrusions of your networks today can be handled by patches, anti-virus and user actions. We spend 90 percent of our time on the 80 percent of the issues that could be handled by good hygiene.

Read more

Security breaches usually entail more recovery efforts than acts of God. Unlike proverbial lightning, breaches of security can be counted on to strike twice unless the route of compromise has been shut off.

Read more

If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders.

Read more

“Do I want to know why you’re so informed about spyware?” she asked. Nikolaos gave her a charming, dazzling smile. “No, my dear. You do not.”

Read more

We didn’t install the [Code Red] patch on those DMZ systems because they were only used for development and testing [Shortly after spending 48 hours straight removing Code Red worm from internal corporate servers in 2001].

Read more

Pin It on Pinterest