Blockchain Data Management

In my last blog, I provided a brief on the basics of blockchain. In this blog, I will try to further explore how the actual data gets …


Why Security Needs to Automate, Too

Let’s face it: Security does not like automation. Putting machines in control of things like provisioning, data access, backup and a host of other functions merely adds more risk to an already risky environment that is now pushing way past the firewall to the cloud and the edge. …


A Call to Structure

When building a threat Intelligence team you will face a range of challenges and problems. One of the most significant ones is about how to …