Published inMicrosoft CybersecurityZero Trust security model imperative for resilience against identity threatsIn the third of this three-part series, I share why organizations need to implement a zero trust security model to keep corporate and…Oct 8, 2019Oct 8, 2019
Published inMicrosoft CybersecurityAbout Identity, Part 2: 3 Common Identity AttacksIn the second of this three part series, I identify common identity-related attacks to be aware of, both as an enterprise that needs to…Sep 9, 20191Sep 9, 20191
Published inMicrosoft CybersecurityAbout Identity, Part 1: Protect your mailbox, protect your digital identityTrust is eroding — making safeguarding identities critical.Aug 27, 2019Aug 27, 2019
Published inMicrosoft Cybersecurity5 security recommendations for organizations embracing cloud servicesIn a previous blog post, I shared that when organizations are embracing hybrid and cloud infrastructures, they need to be vigilant against…Aug 6, 2019Aug 6, 2019
Published inMicrosoft CybersecurityWhen the adversary lurks in your cloudOrganizations embracing hybrid and cloud infrastructures are experiencing the benefits of business agility and operational cost savings. ButJul 23, 2019Jul 23, 2019
Published inMicrosoft CybersecurityData Dive: 5 Recommendations to Stay Ahead of Drive-by Download Attacks (Part 2)In Part 1, I provided an overview of drive-by download (DbD) attacks. Today, I share 5 recommendations for reducing the risk of such…May 16, 2019May 16, 2019
Published inMicrosoft CybersecurityData Dive: An accidental “drive-by” on the Internet highway (Part 1)Whether you are driving down an unfamiliar road or browsing the Internet highway, it is important to be aware of your surroundings…Apr 30, 2019Apr 30, 2019
Published inMicrosoft CybersecurityResilience: the key to survival in life and cyberspaceWhen you hear the word “resilience”, You may not think of survival first, but it is key for surviving life in the real and digital worlds.Apr 23, 2019Apr 23, 2019
Published inMicrosoft CybersecurityData Dive: What we learn from global malware trends in 2018 (Part 2)In 2018, for the Asia-Pacific region, we observed a higher malware rate than the global average. Here we share some cybersecurity hygiene…Apr 4, 2019Apr 4, 2019
Published inMicrosoft CybersecurityData Dive: What we learn from global malware trends in 2018 (Part 1)In 2018, we observed an overall decline in malware encounter rates. That said, there is still a long way to go depending on what part of…Apr 2, 2019Apr 2, 2019