Recent Blog Posts

Vault2

What cybersecurity data should you trust?

The limitations of security data We are constantly being bombarded by cybersecurity data, reports, and marketing collateral—and not all of this information should be treated equally. Security data inherently has limitations and biases, which result in varying value and relevance … Read more >

Your appliances may be out to get you

Sometimes I think my appliances are conspiring against me. You know, when the dishwasher stops cleaning dishes on the same morning as the garbage disposal clogs up and the coffeemaker overflows. It’s like they have a secret planning session to overthrow … Read more >

Security Balance

Can zealous security cause harm?

Too much or too little of each can be unhealthy and lead to unintended consequences.  We are entering an era where the risks of connected technology can exceed the inconveniences of interrupted online services or the release of sensitive data.  … Read more >

Cloud-Adoption-Security2

Will your cloud be at risk?

  The Cloud is both compelling and alluring, offering benefits that entice many organizations into rapid adoption. The attractiveness of lower operational costs, powering new service offerings, and adaptability to cater to varying demands makes it almost irresistible to rush … Read more >

Verizon 2016 DBIR

Key lessons from the 2016 Verizon data breach incident report

The annual Data Breach Incident Report (DBIR) is out and reinforcing the value of well-established cybersecurity practices.  The good folks at Verizon Enterprise have once again published one of the most respected annual reports in the security industry, the DBIR. … Read more >

AV-image

The case for Augmented Virtuality

The tech world is abuzz with talk of Virtual Reality and Augmented Reality. With VR, the user can become fully immersed in a virtual world. With AR, the user sees the real world—but with digital information and virtual objects rendered … Read more >