It’s no secret that security threats continue to expand in volume and variety, making headlines on virtually a daily basis. From nation-state attacks, corporate espionage, and data exfiltration campaigns to all-in-one and sneaker bot campaigns, busines…
The FBI Intrusion Notification Program
The FBI intrusion notification program is one of the most important developments in cyber security during the last 15 years. This program achieved mainstream recognition on 24 March 2014 when Ellen Nakashima reported on it for the Washington Post …
Metrics That Matter: Continuous Performance Optimization
To attract and retain customers, you must offer an exceptional digital experience. In an increasingly competitive business climate, organizations are fighting to maintain loyalty and keep users engaged online. The cost of switching is low, consumers ar…
New Book! The Best of TaoSecurity Blog, Volume 2
I published a new book!The Best of TaoSecurity Blog, Volume 2: Network Security Monitoring, Technical Notes, Research, and China and the Advanced Persistent ThreatIt’s in the Kindle Store, and if you’re Unlimited it’s free. Print edition to follo…
Women’s Foundation of Boston Empowerment Webinar for Girls and Young Women
Akamai is thrilled to have been the lead sponsor for the recent Women’s Foundation of Boston Empowerment Webinar for Girls and Young Women: Girl Decoded: An Intimate Conversation with Author Rana el Kaliouby about finding your voice, pursuing education…
Becoming a Comms and Analyst Relations Leader, Rita Aspen – Head, Communications & Analyst Relations, APJ
My parents were first-generation immigrants from India. They worked hard, made Singapore their home and took all and any challenges head on. They have always lived by the simple philosophy, ‘to be the change’. It’s a philosophy that I try to live too, …
Addressing the Cloud Security Readiness Gap
Cloud security is about much more than security functionality. The top cloud providers all seem to have a capable suite of security features and most surveyed organizations report that they see all the top cloud platforms as generally secure. So, why d…
How Criminals Attack the Games Industry
If you work in the video games industry, it’s already obvious that security is a challenge, and criminals are a threat. But how much do you know about how the criminal economy works? What actually motivates them? What specific methods do they use? And …
Getting Published: Here are 7 Powerful Strategies I’ve Used for 5 Years
In 2014, I started writing content on LinkedIn — after a few articles, I was looking to land a mainstream publication and had TechCrunch in my sights. I started pitching myself like crazy — and was rejected…like crazy. Spoiler: I successfully made it into TechCrunch, but it took me 2 years and over a dozen rejections. […]
The post Getting Published: Here are 7 Powerful Strategies I’ve Used for 5 Years appeared first on Massive Alliance.
Kali Linux 2020.3 Release (ZSH, Win-KeX, HiDPI & Bluetooth Arsenal)
Its that time of year again, time for another Kali Linux release! Quarter #3 – Kali Linux 2020.3. This release has various impressive updates, all of which are ready for immediate download or updating.
A quick overview of what’s new since the las…