Search Results

Blog

Category

Hardening iOS

Hardening iOS

When Apple’s iPhone hit the market in 2007, the shockwaves were intense. If you look back to the mid-2000s, the leading mobile phone looked like a prop from a cheesy sci-fi movie. The iPhone changed that. It introduced near full-body screens, a universe of apps, and a...
The Technology You Own, Ends Up Owning You

The Technology You Own, Ends Up Owning You

In a recent article, Rupert Goodwins wrote that Information Security technology is a sham. His thesis is that for all the innovative technologies in the marketplace, they routinely fail to fulfill their fundamental purpose of protecting a business. Every new breach...

RSA Conference 2016 – Once More Unto the Breach

On Thursday, RSA really starts to fall apart.  Everybody is tired, angry, and sick of the Chinese food from Cybereason’s truck.  The booth workers get aggressive, the keynotes get salesy, and everywhere you turn there is another breach horror story. But alas, once...

RSA Conference 2016 – Prelude to Lunacy

Alas, poor Amit! I knew it, RSA 2016, a cybersecurity conference of infinite jest, of most excellent fancy. Here begins the week posturing, posing, raving, screeching, blathering, drinking, and high-performance irrational exuberance.  RSA Conference 2016 is about to...