A cybersecurity expert with over 20 years of experience in web technologies, architecture, infrastructure, networking and dev environments, Nick is responsible for solution management, technology strategy and technology partnerships. Nick was previously Symantec Group CTO for Global Service Providers, following his tenure as Director of the Chief Architect Team for Channel and Service Providers at Zscaler and an earlier position in the Symantec CTO organization. His certifications include CEH7, CCSK, BCCPP, Bluecoat Blue Knight, MCSE + Security, CCDP, CCNA, CCSA, VTP5 and VTSP5.
Time to Rethink Layered Security
In this post, we update the layered security concept for the age of Zero Trust, cloud computing, application-based work and work-from-anywhere.
Read MoreSigned Proxy App Slips Malware Past Virus Detection
Malware samples embedded in pirated software and games silently installed proxies on millions of devices to create a malicious botnet, without users approving or even knowing that they were installed.
Read MoreDespite Best Intentions, Humans Remain the Weak Link
When it comes to cybersecurity, the fatal flaw in the best practices to-do list is that every element requires every single IT manager and user to be completely on board, 100% of the time.
Read MoreNew Variant of Credential-Stealing Browser Malware
The new Zaraza bot successfully decrypts encrypted user credentials stored in browsers and exfiltrates them to Telegram servers for purchase by aspiring cybercriminals.
Read MoreHelping the Public Sector Drive Innovation and Security
SaaS apps, collaboration platforms, and virtual meeting solutions can increase efficiency, they also increase exposure to cybersecurity risks.
Read MoreThe 3 Top Attack Vectors and How to Protect Government Agencies Against Them
86% of cyberattacks are initiated through only three attack vectors. Shut them down and the odds of a breach at your organization drop significantly.
Read MoreNot Just a Netflix Plotline: Nation-State Cyberattacks Get Real
As nation-state cyberattacks are more widely deployed and effective, it’s time for governments at every level to adopt strong Zero Trust defenses.
Read MoreWhat Lawyers Need to Do to Defend Their Clients and Themselves from Cyber Risk
Given the centrality of trust in the relationships between law firms and their clients, law firms are frequent and attractive targets for cyberattacks.
Read MoreStolen Cookies Enabling Financial Fraud
In recently reported Adversary-in-the-Middle attacks, hackers bypass MFA by using session cookies that they illicitly extract from HTTPs requests, via reverse proxies.
Read MoreReducing Compliance Risk with Web Application Isolation (WAI)
Regulated industries like healthcare and financial services are facing an increasingly complex regulatory environment.
Read More