security through obscurity a key lost among leaves

Security through Obscurity: Cybersecurity Explained

Security through Obscurity has been in tech news recently because of NimzaLoader, a new piece of malware written in a somewhat esoteric...

The Pipeline’s Top Tips for Servicemembers in Transition

As a former Air Force pilot and serving reservist, I bring a wide range of skills and experiences to BluVector, a cybersecurity...

Adam Rice: Special Forces Solider, VP & CISO for Hilton, and...

We’ve made an effort at The Pipeline to showcase veterans and members of the military community who took different paths to their cybersecurity role. Today we hear from Adam Rice, who serves as CISO for Hilton and took a unique path to get there.

The Cyber Impact of Jan 6th US Capitol Events May Be...

The cybersecurity of our nation’s leaders was in jeopardy Wednesday. Intruders had direct physical access to top US Government officials’ computers - with some unlocked and open to email.

Michael Leidinger: Submariner, SVP & CIO for Hilton, and Navy Veteran

We connected with Hilton’s Michael Leidinger to discuss his path from the Navy to the private sector at Hilton where he serves as Chief Information Officer. Hilton was founded by a veteran and has hired thousands of veterans, military spouses, National Guard and reserve members in just the last few years. Michael joined Hilton in 2010. His military career began at the United States Naval Academy.

Don’t Rely on Identity for Security

You may have heard that identity is the new security perimeter. You might even think that moving to the cloud allows you to leave behind your traditional network security, hoping that your users and assets will be safe as long as you trust no one and authenticate each user. That would be a big mistake, and you will still be at a high level of risk!

The Pipeline: Garrett Guinivan – From The Masters to Cyber Threat...

Every veteran’s journey into cybersecurity is unique. In the case of Garrett Guinivan, his path involved studying turfgrass, working at golf courses,...

The Pipeline: Charles Johnston -Advanced Threat Detection Analyst, Cybersecurity Practitioner and...

Welcome back to The Pipeline, where we highlight members of the military community who are working in cybersecurity. Today we're speaking with...

Emerging Threats: Egregor

Since their discovery in September 2020, Egregor has racked up a long list of victims, notably taking credit for hacking Barnes & Noble and the game developers Ubisoft and Crytek.

4 Out of 5 Dentists Recommend Improving Your Cybersecurity

Remote is our new reality. Large tech companies like Twitter, Slack, and Facebook have made headlines for offering permanent work-from-home, and many others have moved back their targets for returning to offices to Summer 2021. It’s time for cybersecurity decision makers to embrace the New Networking Normal and make sure that WFH, in-office, and hybrid workers are part of your security strategy.

Trending