CONTRIBUTOR RAY POMPON

blog /Jul 20, 2017

Phishing for Information, Part 2: How Attackers Collect Data About Your Employees

The personal and job-related information that employees often innocently post on various websites makes it easy for phishers to pull off their scams.

blog /Jul 18, 2017

How to Avoid the Six Most Common Audit Failures

A veteran auditor told us how organizations fail audits. Here are six detailed strategies to help you achieve success.

blog /Jul 11, 2017

Who Should the CISO Report To?

Savvy organizations that understand the gravity of cyber security are giving CISOs a voice at the executive table.

blog /Jul 06, 2017

Phishing for Information, Part 1: How Phishers Bait Their Hooks with Information You Volunteer

In this five-part blog series, we look at how cyber scammers vacuum up information across the Internet to build profiles for phishing and other kinds of social engineering attacks.

blog /Jun 21, 2017

Russian Hackers, Face to Face

An undercover interview of two infamous Russian hackers speak volumes about skills, passion, and motivation of some of the world’s most dangerous cybercriminals.

blog /Jun 14, 2017

Yak Shaving: CISOs Aren’t Immune

Sometimes, CISOs spin their wheels doing useless security activity that only looks productive from the outside.

blog /Jun 08, 2017

10 Ways Organizations Can Get Ready for Breach Disclosure

Facing data breach disclosure requirements across the globe, organizations need to be prepare in advance to respond well.

blog /May 23, 2017

How a CISO Can Play a Role in Selling Security

More and more CISOs are finding themselves pulled into the sales cycle to defend and sell their security programs. Here’s how to do it right.

blog /May 12, 2017

From NSA Exploit to Widespread Ransomware: WannaCry is on the Loose

The new EternalBlue NSA exploit is powering a wave of virulent ransomware sweeping across Europe.

blog /May 09, 2017

Can Your Risk Assessment Stand Up Under Scrutiny?

Risk assessments are a key part of a security program, but their execution and format are highly variable. Regulators can sanction organizations that perform improper or inadequate risk assessments.

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.