Dave RoseGet your magnifying glass — time to detect! BEC Series #4A few weeks ago, we published the Business Email Compromise (BEC) Checklist. The question arose — what if you’re new to security, or your…Jan 2, 2019Jan 2, 2019
Dave RoseRiding the Blockchain Express to “De-Central” Station.Riding the Blockchain Express to “De-Central” Station.Dec 31, 2018Dec 31, 2018
Dave RoseThe mathematician as extortionist: ransomware “smart” contractsThe mathematician as extortionist: ransomware “smart” contractsDec 6, 2018Dec 6, 2018
Dave RoseTime to protect — BEC Series #3A few weeks ago, we published the Business Email Compromise (BEC) Checklist. The question arose — what if you’re new to security, or your…Nov 29, 2018Nov 29, 2018
Dave RoseOSINT YourselfIf you’re unfamiliar with the term “OSINT” (open-source intelligence) it boils down to finding information that’s publicly and freely…Nov 19, 2018Nov 19, 2018
Dave RoseHealthcare information access concerns“Healthcare…the only industry where employees are the predominant threat actors in breaches.” Straight out of Verizon’s 2017 Data Breach…Oct 26, 2018Oct 26, 2018
Dave RoseHow do you “identify”…Part 2A few weeks ago, we published the Business Email Compromise (BEC) Checklist. The question arose — what if you’re new to security, or your…Oct 26, 2018Oct 26, 2018
Dave RoseBitcoin “Proof of Work”: 51% of Accountants Agree!Bitcoin “Proof of Work”: 51% of Accountants Agree!Oct 22, 2018Oct 22, 2018
Dave RoseHow do you “Identify”?Recently, we posted the Business Email Compromise (BEC) checklist. We’ve gotten a lot of great feedback on the checklist…as well as a few…Oct 12, 2018Oct 12, 2018
Dave RosePositive Train Control: Skating away on the thin ice of a new day?Positive Train Control: Skating away on the thin ice of a new day?Sep 17, 2018Sep 17, 2018