Lack of User Visibility Dooms Citrix in Latest Breach

Lack of User Visibility Dooms Citrix in Latest Breach

A new attack on Citrix, March 8, 2019, using a technique called password spraying places significance on a chief issue that passwords pose for companies; end-users that select weak passwords or use login credentials on different sites leave their organizations open to...
Familiar Implementation

Familiar Implementation

You might hear something like “Cymatic Security implements in a way that’s familiar to your user and your administrators.” It’s worth clarifying that, because it’s a really powerful statement. No one likes to be told that a solution to a problem is “simple.” Probably...

Familiar Implementation

You might hear something like “Cymatic Security implements in a way that’s familiar to your user and your administrators.” It’s worth clarifying that, because it’s a really powerful statement. No one likes to be told that a solution to a...
I Believe Many Use the Word “Threat” Incorrectly

I Believe Many Use the Word “Threat” Incorrectly

I feel that too many people conflate “threat” and “vulnerability” but couldn’t quite put my finger on a clear definition. I think I now can. I was listening to the estimable John Gruber’s Talk Show podcast, episode 243 with Rich Mogull, where he talked all about...