The most recent content from our members.
Home from San Diego and Cisco Live! for a few days, just enough time to spend Father's Day with friends and family. Now I'm back on the road, heading to Lingen, Germany, for Data Grillen. That's right, an event dedicated to data, bratwurst, and beer. I may never come home. As always, here are some links from the Intertubz…
This week's Actuator comes to you direct from the Fire Circle in my backyard because (1) I am home for a few weeks and (2) it finally stopped raining. The month of May has been filled with events for me these past nine years, but not this year. So of course, the skies have been gray for weeks. We are at 130% rainfall year…
In an earlier blog, we saw what a blended threat is and what all elements constitute it. To quickly recap, a blended threat is a composite security threat which involves various threat vectors coordinated to launch a high-degree security exploit that’s both difficult to detect and contain. How Does a Blended Threat Work?…
It’s no surprise that security attacks are getting more complex and sophisticated to deal with. Such advancement in the technology of cyber-crime makes it paramount that IT security teams start understanding new-age threats, and equip themselves with proper strategies to counter attacks. Blended threats are one of the many…
It looks like you're new here. Sign in or register to get started.