CONTRIBUTOR RAY POMPON

blog / avr. 14, 2017 (MODIFIED: avr. 25, 2017)

Stalking in the Workplace: What CISOs Can Do

Cyberstalking will rise as hacking tools become more powerful and easier to use, but there’s much you can do to help protect victims.

article / avr. 12, 2017 (MODIFIED: avr. 25, 2017)

Doxing, DoS, and Defacement: Today’s Mainstream Hacktivism Tools

Readily available hacking tools provide new ways for civil disobedience groups to antagonize their targets anonymously.

blog / mars 30, 2017 (MODIFIED: avr. 25, 2017)

How to Talk Cyber Risk with Executives

Board level interest in your cyber risk posture is growing, in fact it might be required soon for publicly traded companies. Presenting cyber risk to your board – effectively – means talking in their terms.

blog / mars 24, 2017 (MODIFIED: avr. 14, 2017)

Cyber Insurance: Read the Fine Print!

Purchasing cyber insurance can be useful, but claims are often denied due to policy exclusions or lapses in controls.

blog / mars 20, 2017 (MODIFIED: avr. 20, 2017)

Can Audits Help Us Trust Third Parties?

Organizations who outsource need to measure the risk of entrusting their data to someone else. They aren’t easy or cheap, but audits are really the best tool we have.

blog / mars 13, 2017 (MODIFIED: avr. 14, 2017)

Will Deception as a Defense Become Mainstream?

Defensive deception works well, but needs championing before we’ll see it as a best practice or compliance requirement.

article / mars 10, 2017 (MODIFIED: avr. 25, 2017)

DNS Is Still the Achilles’ Heel of the Internet

Since the Internet can’t survive without DNS, let’s make our best effort to defend it.

blog / févr. 23, 2017 (MODIFIED: mars 20, 2017)

Building Secure Solutions Successfully Using Systems Theory

When security solutions don’t work as planned, embrace the complexity and use Systems Theory tools to adjust, regulate, and redefine.

blog / févr. 14, 2017 (MODIFIED: mars 20, 2017)

The Conflicting Obligations of a Security Leader

Faced with competing pressures, CISOs are ultimately the experts at assessing what’s truly at stake in their organizations.

blog / févr. 09, 2017 (MODIFIED: mars 03, 2017)

The Risk Pivot: Succeeding with Business Leadership by Quantifying...

Getting the security investments you need often comes down to making your case to management in terms of operational risk.

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.