Information Security Leader, Author, Instructor and Speaker

Default utility Image

Social engineering attack: How to remove rogue security software TAGS: | Security practitioners exhort users to install antivirus software and firewalls, and patch their systems. After hearing this for years, users …Continue reading →

Default utility Image

Ransomware: How to deal with advanced encryption algorithms TAGS: | It’s 6 p.m. on a Friday, and you’re getting ready to pack up for the weekend when your telephone rings. …Continue reading →

Default utility Image

Battling image spam TAGS: | You’ve installed keyword-based spam filters and invested countless staff hours tuning its performance to suit your environment. Perhaps you’ve even …Continue reading →