Booklist Review of A Hacker’s Mind

Booklist reviews A Hacker’s Mind: Author and public-interest security technologist Schneier (Data and Goliath, 2015) defines a “hack” as an activity allowed by a system “that subverts the rules or norms of the system […] at the expense of someone…

Seasons Greetings from (ISC)2

Dear (ISC)² Members, Associates and Candidates:  I hope this message finds you well. As 2022 comes to an end, I am grateful for the opportunity to reflect on the past year and all we have achieved together.   Launching an entry-level certification…

Build or Buy your own antivirus product

We can help you decide if you should build your own antivirus product or if you should license an OEM or whitelabel product. If you are thinking of building an antivirus product in order to offer your customers 360 degree…

Beyond Identity Receives FIDO2 Certification

NEW YORK–(BUSINESS WIRE)–Beyond Identity, the leading provider of passwordless, phishing-resistant MFA, announced today that it has received FIDO2 certification. The company’s advanced authentication platform dramatically simplifies enterprise adoption of standards-based passwordless authentication and phishing-resistant MFA. Beyond Identity extends FIDO2 with…