About Dan Sher

Posts by Dan Sher

Incapsula: Wordpress Default Setting Opens up Sites to DDoS Exploit

Popular content management system Wordpress is harboring a default setting that is making is susceptible to compromise, according to recent research. Gur Shatz, CEO of IT security vendor Incapsula, wrote in a blog post that a recent Distributed Denial of Service (DDoS) attack mitigated by his firm exposed this vulnerability.

Read more

APWG: Nearly Half of All Phishing Attacks Leveraged Hacked Hosting Providers

Hacked hosting providers are becoming a fertile launch pad for new phishing attacks, accounting for nearly half of all phishing incidents during the second half of 2012, according to new research from the Anti-Phishing Working Group (APWG). The fact that these phishing attacks are increasing is not surprising, since based on earlier reports...

Read more

FSOC: Financial Regulators Warn of Ongoing Cyber Attacks

The federal government issued a strong warning to the financial services sector: Beware of cyber threats, according to the recently released 2012 Financial Stability Oversight Council (FSOC) report. The FSOC report, which fulfills a Congressional mandate to describe "significant financial market and regulatory developments, analyze...

Read more

Trojans Account for Nearly 80 Percent of All Computer Infections Worldwide: Report

Trojans are still the cyber criminals delivery mechanism of choice accounting for nearly three out of every four new malware samples in circulation, according to a new report. Panda Security’s anti-malware laboratory, PandaLabs, analyzed IT security events and incidents from January through March 2013. Despite their inability to...

Read more

Companies Know the BYOD Risk, Yet Most Still Allow It: Symantec

Despite the security risks involved in bringing personal technology into the workplace (BYOD), many employers believe that the benefits of allowing workers to use their own devices far outweigh the potential pitfalls, according to a recent Symantec survey. The survey, which polled 236 attendees of the recent Symantec Vision conference on how...

Read more

Small, but Mighty: Three-Quarters of DDoS Attacks Less Than 100 Mbps

More than a third of companies endured a disruptive attack last year, according to a new survey [pdf]. Thirty-five percent of those surveyed across industries dealt with at least one Distributed Denial of Service (DDoS) incident, with attacks on the retail sector seeing the largest year-to-year increase (16 percent to 39 percent), making for a...

Read more

Verizon: "No Organization is Immune to a Data Breach in this Day and Age"

Opportunistic attacks, the majority of which were financially motivated, were far and away the biggest threat source of 2012, accounting for 75 percent of all breaches analyzed in the latest Verizon Data Breach Investigations Report (DBIR). State-affiliated cyberespionage campaigns held the number two breach spot, accounting for 20 percent of...

Read more

"Community Defense" For a Safer Internet

Early identification of attacks across a community of Web applications can significantly improve the effectiveness of application security, according to the latest Imperva Hacker Intelligence Initiative report. The report, "Get What You Give: The Value of Shared Threat Intelligence," analyzed real-world attack traffic against 60 web...

Read more

Solutionary: North Korea Cyberattack Activity Boomed in February

February saw a significant jump in cyber attack activity emanating from North Korea, according to recent analysis. IT security vendor Solutionary found that “touches”-- a known reconnaissance, an overt external attack or the attempted exfiltration of data -- from North Korean IP addresses spiked during the month of February....

Read more

Survey: Consumers Not Pleased with Current Online Authentication Process

When it comes to online business, the traditional username/password authentication process generates plenty of consumer frustration, according to a new survey by the Ponemon Institute. Roughly 50 percent of respondents in the Ponemon survey, "Moving Beyond Passwords: Consumer Attitudes on Online Authentication," were either...

Read more

Insider Threats Are Top of Mind With Security Pros, Not With the Enterprise

It's the Devil you know. Insider threats are a major security concern for security professionals, yet management is not always taking the proper steps to mitigate -- or even acknowledge -- risk, according to the findings of two recent surveys. IT security vendor AlgoSec polled 179 information security and network operations professionals...

Read more

Flooded: DDoS Bandwidth Increased 700 Percent During Q1 2013

The DDoS tidal wave continues to grow. The average Distributed Denial of Service (DDoS) attack bandwidth totaled 48.25 Gbps in the first quarter of 2013, a 718% increase over last quarter, and the average packet-per-second rate reached 32.4 million, according to a new report by DDoS defense provider Prolexic. Prolexic culled data from their...

Read more

NQ Mobile: 95 Percent Of All Mobile Malware Afflicts Android OS

Mobile malware threats increased 163% to more than 65,000 in 2012, according to a new report by NQ Mobile. This huge year-to-year spike in threats are mostly impacting a single operating system, with nearly 95 percent of all mobile malware discovered in 2012 targeting the Android OS, according to NQ Mobile, its 2012 Security Report is based on...

Read more

Game "Hacks" Could Leave You Vulnerable to an Even Bigger Hack

If you're looking to "hack" your way towards a better video game score OR tempted to download a copy of the latest title through your friendly neighborhood file-sharing service, don't bother. It's almost certainly loaded with malware, according to new research. Anti-virus provider AVG analyzed scores of such hacks and...

Read more

Cybersecurity Bill Passes House, Faces Uncertain Future in Senate

Despite White House protestations and a threatened veto [PDF], the House of Representatives passed the Cyber Intelligence Sharing and Protection Act (CISPA) Thursday by a comfortable 288 - 127 margin (17 members did not issue a vote). The primary aim of CISPA is to encourage corporate and public sector information sharing that could help defeat...

Read more

Reddit: "It was a Legit, Malicious DDoS Aimed at Taking us Down"

The popular link sharing site Reddit has been enduring a large Distributed Denial-of-Service (DDoS) attack since earlier this morning, according to a statement made via Twitter. As the day moves on, the site appears to have survived the attack, but according to Reddit's Twitter status alert, while they have "mitigated a decent portion...

Read more

Anonymous' DDoS Attack Against Israel Leverages Botnet Network

Botnets were responsible for the recent cyber attack aimed at Israel, according to a review of the incident from Trend Micro. On April 7, the hacktivist group Anonymous reportedly began a targeted Distributed Denial of Service (DDoS) campaign against various Israeli websites i/blog/wp-admin/post.php?post=6834&action=editn retaliation for...

Read more

Cybercrimes of Opportunity in Wake of Busy News Week

Tragedy tends to bring out the best in the human spirit, but to those without a moral compass, it can mean opportunity. The recent Boston Marathon bombing has apparently brought out cyber criminals looking to take advantage of a wounded public’s need to know, generating a massive spam and malware campaign. Michael Molsner, a regional...

Read more

UK-Based IT Managers Increasingly Concerned About DDoS: Survey

Of all of the threats in the cyber criminals toolkit, the Distributed Denial of Service (DDoS) attack continues to weigh heavily on the mind of UK-based IT managers, according to a recent report. Nearly half (41 percent) of all IT managers surveyed claimed they were ‘highly or extremely’ concerned about their organization being the...

Read more

Report: SMBs Being Battered By Targeted Threats

Symantec's newly released Internet Security Threat Report found that there was a 42 percent rise during 2012 in targeted attacks in comparison to the previous year. SMBs -- companies with fewer than 250 employees -- were particularly impacted by this spike in cybercrime, finding themselves on the receiving end of 31 percent of all targeted...

Read more

Tech Pros Leaving Thousands At The Negotiating Table

Just happy to be employed and not so sure you should tempt fate by quibbling over a few bucks? By not negotiating, many IT professionals are leaving thousands on the bargaining table, according to a new survey. Dice.com, a career site for technology and engineering professionals, surveyed 838 hiring managers and recruiters. The majority said...

Read more

New SEC Filings Show Impact Of DDoS Campaign On Banks

Normally tight-lipped about alleged cyber threats, new SEC filings by some of the nation’s largest banks show how recent Distributed Denial of Service (DDoS) attacks have made an impact. JP Morgan Chase, Citigroup, US Bancorp, Capital One and Goldman Sachs, revealed that they were, in fact, subject to repeated DDoS attacks during the...

Read more

ZeroAccess Botnet Tops Security Vendor's Q1 Threat List

The top threat impacting cybersecurity worldwide this quarter remains ZeroAccess, the Bitcoin mining botnet, according to network security vendor Fortinet. Based on reporting from FortiGate devices worldwide, ZeroAccess is the number one botnet threat the team is seeing. ZeroAccess is used primarily for click fraud and Bitcoin...

Read more

More Than 60 Percent Of Enteprises Allow BYOD: Report

More than 6 out of 10 companies (64 percent) allow employees to bring their own devices (BYOD) into the workplace, with the majority of these citing improved productivity as the main driver, according to a new survey. For 58 percent of these companies, they allow a mix of corporate-liable and individual-liable devices. A full third of companies...

Read more

Privacy Advocates Vs. Legislators: House To Revisit CISPA This Week

Call it 'cybersecurity' week in our nation's capital, as Internet privacy advocates clash with legislators on the best way enact quality cybersecurity legislation. The House Intelligence Committee plans to revisit the polarizing Cyber Intelligence Sharing and Protection Act (CISPA) this week, scheduling a "mark up" session...

Read more

New Survey Predicts The Rise Of The "Everyday Hacker"

It's so easy, almost anyone can do it. Hack, that is. Easily accessible information will allow for those with only rudimentary technical skill to exploit such things as an SQL injection vulnerability, according to a new report from Veracode.

Read more

Report Roundup: Where Big Data Was And Where It's Going

Big Data is being put to big use, as a little more than half of companies globally have adopted some sort of Big Data initiative in the past year, according to a new global trends report. Tata Consultancy Services (TCS) just wrapped up a massive global big data study, surveying 1,217 companies in nine countries spanning four regions of the...

Read more

McAfee: "Can You Trust Retailer’s Security And How They Protect Your Information?"

McAfee reports on the growing risks the industry is facing with both legacy and newer point of sale systems (POS), finding that retailers need to be more than simply PCI DSS compliant to protect consumer data. “The industry is very fragmented with a large base of smaller merchants utilizing secondary market or used point of sale...

Read more

Access Governance: Perceptions And Misconceptions

We touched on Access Governance (AG) last year, but have found that misconceptions about the space still fuel some of the discussion. Access Governance is basically the overarching system that governs who has access to what in a given organization, or as we wrote last year, it approaches identity management from a “business...

Read more

Recent Bank DDoS Attacks Reach New Downtime Levels

The Distributed Denial of Service (DDoS) attacks that have been hammering the commercial banking sector since last Fall have reached a new level of efficiency nearly doubling the amount of collective downtime, according to a new report issued by NBC News. The largest 15 banks were knocked offline for a total of 249 hours during a recent...

Read more

ICS-CERT Reports On Phishing Campaign Against 11 Energy Sector Companies

A spear phishing campaign, seeking to leverage public information to ensnare its victims, was reportedly leveled against 11 different energy sector firms, according to a recent report. The latest edition of the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Monitor, a quarterly publication, said that information —...

Read more

Evolving Threats To Drive Cloud-Based Security Market

Sales of cloud-based security services will grow 69% over the next 5 years, according to new research. This forecast comes on the heels of a big year in the market for global cloud and customer premises equipment (CPE)-based security services, which grew another 12% in 2012 to $13 billion, according to Infonetics' just released Cloud and...

Read more

Mt. Gox: Bitcoin Exchange Under DDoS Attack

Mt. Gox, the largest Bitcoin exchange in the world, is fending off a massive Distributed Denial of Service (DDoS) attack, according to a Facebook post. The digital currency exchange, which is based in Tokyo, said that the ongoing DDoS attack has caused trading lags, generated error messages for users and even shut down the site for a period of...

Read more

Technology Companies Attacked Once Every Minute, According To New Report

The average enterprise is under a constant state of duress, experiencing a malware event roughly once every three minutes. The rate of malware activity, of course, varies across type of industry. For technology companies, the most highly targeted vertical, that figure drops down to once every minute, according to FireEye's 2nd Half of 2012 Advanced Threat Report.

Read more

SDN: Really Important To The Network, Yet Confusion Reigns

Software Defined Networking (SDN) is one of the latest network operation buzzwords, promising to revolutionize cloud and enterprise networks alike. The concept is so vital, that most organizations consider it the single most important network technology initiative, according to a new survey. Despite its importance, many companies are still...

Read more

Password Problems: Majority Of Security Pros Violate A Big Mobile Best Practice

Even security pros practice poor security "hygiene," with some 83 percent saying they use the same password across multiple mobile applications, according to a new survey.

Read more

IBM: Web Application Vulnerabilities Threaten The Enterprise

Web application vulnerabilities remained one of enterprises most pressing issues, rising 14% in 2012  over 2011 end of year numbers, according to a recent report. These vulnerabilities were exploited by attackers who, more often then not, injected malicious scripts and executables onto legitimate websites, targeting client side...

Read more

Stating the Obvious: CIOs Work Hard

Always tethered to the clock, an organization's chief information officer (CIO) is more likely to be working nights, than enjoying some quiet time at home, according to a new survey. The majority of CIOs surveyed -- 73 percent -- said they they check in with work "often" or "somewhat often" on evenings and weekends. Only...

Read more

Malware Threats And Inconsistent BYOD Policy Driving Mobile Security Market Growth

The mobile security services market has no where to go but up, according to a new industry forecast. The confluence of a 261% uptick in the number of mobile threats, coupled with increasingly complex malware designed to exploit a wider range of mobile devices and inconsistent BYOD policies, is signaling significant growth in the mobile...

Read more

DHS Warns Of Telephony Denial Of Service (TDoS) Attacks

The FBI issued a warning back in January, and now the Department of Homeland Security (DHS) has followed suit. A not-so new denial of service attack is once again attracting the attention of authorities. This latest incarnation utilizes the telephone system to inundate public sector entities, tying up the phone lines and preventing legitimate...

Read more

Enterprise Cloud Security Solutions Still Have a Ways To Go; Report

Enterprise cloud security practices are improving (slightly), but there remains a long way to go, according to a new report. Only around 50 percent of IT leaders surveyed in a new report said they are confident they are aware of all of the cloud services in use within their organization, a roughly 5 percent improvement since 2010. For Mike...

Read more

US-Cert Issues DNS Amplification DDoS Alert

Distributed Denial of Service (DDoS) attacks have become a routine part of the security threat landscape, striking banks, online retails sites and other interconnected targets. In addition to the well-publicized ongoing hacktivist DDoS campaign against global financial institutions (which hit, among others, American Express last week), attacks...

Read more

IT Pros: Not As Stressed As They Used To Be

The number of IT professionals considering leaving their job due to workplace stress has declined from 67% last year to 57% in 2013, according to a recent survey. That doesn't mean that life is simple for IT professionals -- far from it. Nearly two-thirds (65 percent) of all IT administrators surveyed still consider their job stressful...

Read more

80 Percent Of Companies Suffered Web-Borne Attack In 2012; According To Webroot

If you're not on the receiving end of a web-based attack, you're in a distinct minority. Eight out of ten companies endured at least one such attack last year, according to a new survey by security vendor Webroot. Organizations that allow employees to freely access the Web are experiencing high rates of malware threats, including...

Read more

IDC: Worldwide DDoS Prevention Market To Reach $870 million

The 300 Gb/s of traffic hurled at Spamhaus earlier this week during an epic Distributed Denial of Service (DDoS) attack may just be start of an even larger trend: The expanded growth of the DDoS prevention industry. The worldwide market for DDoS prevention solutions -- including products and services -- is expected to grow by a compound annual...

Read more

The State of Server Security: Malware Up, Confidence Down

The conundrum is obvious. While incidents of advanced attacks targeting servers has risen, confidence in being able to identify and stop these attacks has dropped, according to a recent report. 25 percent of respondents in Bit9's annual Server Security Survey said their servers were attacked in 2012, up 8 percent over the previous year....

Read more

Got Work? Revisiting The Market For Security Professionals

As security professionals from across the globe gathered last month at RSA, some of the conversations inevitably turned towards jobs; and many organization's inability to find quality candidates. This has been an issue in the information security field for years, but has recently been vaulted back into the spotlight as President Obama very publicly revisited the issue of cybersecurity.

Read more

Report: All Is Relatively Secure In The Cloud

One of the biggest silver linings surrounding cloud computing of late has been its exponential growth. Spending on cloud services is forecast to grow 18.5 percent to $131 billion worldwide this year, according to Gartner. But with this expansion comes the obvious question: Is it secure? Alert Logic, a cloud security vendor, released its new...

Read more

Report: Nearly 94% Of Endpoints Running Java Are Vulnerable To Exploit

The announcement of a new Java vulnerability seems about as common as sunshine in San Diego. The past few weeks have witnessed a number of Java zero-day vulnerabilities. And according to managed security provider Websense, some 94 percent of browsers may be vulnerable to at least one Java exploit. Charles Renert, Vice President at Websense...

Read more

Report: Traditional Antivirus Struggles To Detect Malware Delivered Via FTP

If you’re looking to deliver malware that effectively evades detection, your best bet is to deploy it using run-of-the-mill File Transfer Protocol (FTP). Malware let loose in this fashion evaded detection by traditional antivirus measures 95 percent of the time for more than 30 days, according to a new report [PDF]. The inaugural Modern...

Read more

Is Spam Increasing? A Look At Some New March Campaigns

Global spam increased 64 percent last month, according to Cisco's IronPort Threat Operations Center. And the election of a new Pope hasn't quelled the unholy barrage of junk and malicious email. Barracuda Networks caught more than 400,000 emails purporting to be CNN news updates with salacious Pontiff-related headlines. One click, and the user is delivered to a domain that points directly to a black hole exploit kit.

Read more

South Korea Cyberattacks: Bravado, Cyberwarfare Or Smokescreen?

The wave of cyberattacks that rattled South Korea this week, targeting television broadcasters YTN, MBC and KBS as well as two major commercial banks, Shinhan Bank and NongHyup Bank, were caused by a piece of wiper malware known as Trojan Horse/Trojan.Jokra and WS.Reputation.1, according to initial research by Symantec.

Read more

Buzzz: Researcher Creates Honeypots To Lure In ICS Attackers

High profile malware attacks -- like Stuxnet, Duqu, and Flame -- have made the security surrounding Industrial Control Systems (ICS) and specifically Supervisory Control and Data Acquisition (SCADA) a very big topic. These attacks piqued the interest of Kyle Wilhoit, a Threat Researcher at Trend Micro, who wanted to find out what was really...

Read more

GAO: IRS Needs To Resolve Information Security Issues

The taxman isn't immune to information security woes. The Government Accountability Office (GAO) has just issued a new report highlighting continued information security woes at the IRS. The report titled, "Information Security: IRS Has Improved Controls but Needs to Resolve Weaknesses," says that longstanding policies and endemic...

Read more

How Secure Is That Security Appliance?

The trusted firewall that is guarding your network may not be as secure as advertised. In a recently released white paper (PDF) titled "Hacking Appliances: Ironic exploits in security products," Ben Williams, a penetration tester for the NCC Group, discovered that roughly 80% of the security products he tested had vulnerabilities...

Read more

Report: 86% Of All Vulnerabilities Found In Third-Party Programs; SCADA At Particular Risk

Go ahead, patch those Microsoft products all you want. It won't necessarily make you impervious to attack, according to a new report. A vulnerability review, issued last week by the vulnerability management company Secunia, found that 86 percent of vulnerabilities discovered in the most popular 50 programs in 2012 were in non-Microsoft (or...

Read more

Breach Bracket: The "March Madness" Tournament Every School Is Trying To Avoid

The security researchers over at AppSecInc's TeamSHATTER -- a company that provides database security, risk and compliance solutions -- have released their annual data breach madness “bracket," highlighting which educational institutions have endured data breaches over the past 12 months.

Read more

U.S. National Vulnerability Database Is, Apparently, Very Vulnerable

No one noticed until yesterday, but administrators of the U.S. National Vulnerability Database (NVD) -- an online/searchable repository of known security flaws and vulnerabilities -- took the site down after they noticed some suspicious activity. That was on March 8th. As of this morning, here is what you see when you log on: Kim...

Read more

Cyber-Threat Report: Americans Attacking Americans? Maybe

The big eye-popper from the latest Solutionary Global Threat Intelligence Report (GTIR), which provides insight and analysis including the cost of cyber threats that enterprises, governments and mid-market organizations faced throughout 2012 and how to defend against them, are the numbers. In data gleaned from real-world interactions with...

Read more

Survey: The Trouble With SIEM

Security Information and Event Management (SIEM) was supposed to make life easier for IT professionals, analyzing the torrent of incoming security data from the network perimeter to provide real-time analysis on security threats. Instead, it seems to have become a bit of an albatross for security pros who have to wrestle with increased...

Read more

GitHub hit with back-to-back DDoS attacks

It happened...again. In February 2012, GitHub -- the popular code sharing site -- experienced what they called a prolonged and "intense" week long Distributed Denial of Service (DDoS) attack. In a statement at the time, Github said that the "attack is global, and has been very intense at times. Yesterday morning, for example,...

Read more

Study: Majority of Small Businesses Suffer Data Breaches; Disclosure Is Another Matter

Small businesses have big data breach problems, and they're having a hard time admitting it. A new Ponemon survey, commissioned by the The Hartford Steam Boiler Inspection and Insurance Company -- a part of reinsurance behemoth Munich Re -- found that while more than half the U.S. small businesses surveyed experienced at least one data...

Read more

Report: Two-Day Long DDoS Attack Breaches U.S. Utility

While phase three of Operation Ababil is now in full swing, banks are not the only enterprises that remain at heightened cyber threat alert. A new case study issued by anti-DDoS vendor Prolexic recounts a recent Layer 4 Distributed-Denial-of-Service (DDoS) attack leveled against U.S. electric utility. Also referred to as a "syn...

Read more

UK Survey: Consumers Have Trust Issues with Banks

Ronald Reagan liked to say "trust, but verify." The people of the UK have spoken, and they feel the same. They're having a difficult time trusting that the financial services industry -- and other organizations that use call centers -- are adequately protecting their personal information. Banks top the list of organizations...

Read more

Survey of RSA Attendees Shows General Security Readiness Lacking

Trapping thousands of security professionals in a room is a great way to gauge which way the industry winds are blowing. At RSA, F5 Networks chose to harness this massive amount of infosec brain power to conduct a security trends survey. They posed two qualifying questions to booth visitors to ascertain whether these practitioners had any...

Read more

Hacktivists: Phase 3 of Their Campaign Against U.S. Financial Institutions Underway

They're back. In a February 26th Pastebin post, the Izz ad-Din al-Qassam Cyber Fighters promised to resurrect their cyber campaign against U.S. financial institutions if offending YouTube videos were not removed from the Internet. The videos were not removed and earlier this week, in another Pastebin missive, the Islamic group...

Read more

Kaspersky: New Botnet Discovered; Potential Threat to Chilean Banks

If you have money in any Latin American banks, it might be a good idea to begin storing some of that cash under the mattress. According to a recent blog post from a Kaspersky Labs expert in Argentina, a new weapon in the emerging Latin American cybercrime space is now targeting two large Chilean banks. AlbaBotnet is designed to unleash phishing...

Read more

Gartner: Application Layer DDoS Attacks to Increase in 2013

Volumetric, blunt-force attacks will remain the primary type of Distributed Denial Of Service Attack (DDoS) in the coming year, but there will be noticeable growth in the incidence of low-and-slow application layer DDoS attacks, according to new research by Gartner.

Read more

Evernote Potential Target of Attack; Issues Security Notice

Did you have trouble logging into Evernote this morning? You’re not alone. The popular note taking software service said it appeared to have been the victim of a coordinated attempt to access secure areas of their service. In a Security Notice issued on its blog, Evernote, which according to the company services 50 million users, tried to...

Read more

RSA Coverage: Japan Offers Best Privacy and Security Policies for Cloud

If you want a secure and private cloud-computing environment, there is no safer place than Japan. On Thursday, The Business Software Alliance (BSA), the software industry’s international watchdog, previewed findings from the forthcoming 2012 Global Cloud Computing Scorecard. The pre-release only shows the scores in the privacy and...

Read more

RSA Coverage: Bad Intentions Will Cost You

All breaches are not created equal. Those with malicious intent cost organizations on average nearly twice ($840,000) as much as those with non-malicious designs ($470,000), according to a new study commissioned by Solera Networks and undertaken by the Ponemon Institute. The report, “The Post Breach Boom,” surveyed security...

Read more

RSA Coverage: Stuxnet Much Older than Thought

Stuxnet, the sophisticated piece of malware that made headlines back in 2010 as the first computer cyber weapon is an evolved version of an earlier incarnation of the infamous worm, according to a Symantec white paper issued at the RSA conference today. The newly discovered Stuxnet variant, according to analysis of the version number embedded in...

Read more

Playing in RSA’s Innovation Sandbox

Zuly Gonzalez inadvertently “RickRolled” herself. Or perhaps it was by design. The co-founder of Light Point Security took to the stage at Monday’s RSA Innovation Sandbox to the opening strains of Rick Astley’s hackneyed Internet meme. The message was a simple one: don’t let the web “RickRoll” you....

Read more

RSA 2013 – an Insider's Take

Bleary eyed and staggering off of an eight-hour flight, it is impossible to miss the signs. They’re all around. A large banner hangs over the escalator that heads down towards baggage claim. It is anti-virus maker Trend Micro issuing the first of many “warm welcomes.” A little self-promotion combined with a healthy dose of big...

Read more