- Select Year
- 2024
- 2023
- 2022
- 2021
- 2020
- 2019
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013
- 2012
- 2011
- 2010
- 2009
![](/sites/default/files/default_images/matrix.jpg)
Black Hat 2014 was a great conference, and left me with some lasting impressions. The crowd- First and foremost, the crowd was a much different mix…
Read More![Riding This Year’s Data Breach Roller Coaster](/sites/default/files/content/blog/field_image/2020-03/matrix_279.jpg)
Meet Dawn Marie Hutchinson. Dawn was hired last year as the head of information security to keep Urban Outfitters void of future attacks. Dawn believes that Urban Outfitters…
Read More![Up close and personal with your data: socially engineered cyber-attacks](/sites/default/files/content/blog/field_image/2020-03/matrix_280.jpg)
In the space of two short weeks, eBay’s ticket selling site StubHub and online bookmakers Paddy Power joined the already long list of 2014 data breaches. And, as always,…
Read More![Regulation, Compliance and Encryption as a Default](/sites/default/files/content/blog/field_image/2020-03/matrix_281.jpg)
Reading an article last weekend about everybody's favourite hero and villain du jour, Edward Snowden, I was particularly struck by one comment: " What last year's…
Read More![Stop the Madness – Get off the Data Breach Train](/sites/default/files/content/blog/field_image/2020-03/matrix_282.jpg)
Back in April 2013, we investigated the motivations behind IT security spending. Our global online survey, targeted at IT professionals, found that newer IT trends – such as…
Read More![Big Data – Ensuring Compliance with “Least Privilege” and “Country of Origin”](/sites/default/files/content/blog/field_image/2020-03/matrix_283.jpg)
Big data analytics are proving a boon to business and government, enabling organizations to analyze whole sets of related data or data from disparate sets, for patterns and…
Read More