Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Joshua Goldfarb

Joshua Goldfarb

Groucho’s Wit, Cloud Complexity, and the Case for Consistent Security Policy BISO_Information-Security.jpg
  • Security Week

Groucho’s Wit, Cloud Complexity, and the Case for Consistent Security Policy

Joshua Goldfarb April 9, 2025
I’ve always been a fan of Groucho Marx. I find his humor, along with his quotes, witty and...
Read More Read more about Groucho’s Wit, Cloud Complexity, and the Case for Consistent Security Policy
Through the Lens of Music: What Cybersecurity Can Learn From Joni Mitchell Cloud-Security-Risks.jpg
  • Security Week

Through the Lens of Music: What Cybersecurity Can Learn From Joni Mitchell

Joshua Goldfarb March 20, 2025
When I was six years old, my parents bought a car that had a cassette player in...
Read More Read more about Through the Lens of Music: What Cybersecurity Can Learn From Joni Mitchell
The Hidden Cost of Compliance: When Regulations Weaken Security AI_Regulation-Challenges.jpg
  • Security Week

The Hidden Cost of Compliance: When Regulations Weaken Security

Joshua Goldfarb February 27, 2025
My favorite part of my job is spending time with customers discussing their pain points, challenges, goals,...
Read More Read more about The Hidden Cost of Compliance: When Regulations Weaken Security

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks chinese-hackers-attacking.jpg 1
  • The Hacker News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

May 22, 2025
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise exploitss.jpg 2
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

May 22, 2025
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks chinese.jpg 3
  • The Hacker News

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

May 22, 2025
Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program cyber-program.jpg 4
  • The Hacker News

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

May 22, 2025
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host exploit.jpg 5
  • The Hacker News

Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

May 22, 2025
Identity Security Has an Automation Problem—And It’s Bigger Than You Think main.jpg 6
  • The Hacker News

Identity Security Has an Automation Problem—And It’s Bigger Than You Think

May 22, 2025
FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections lumma-stealer.jpg 7
  • The Hacker News

FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections

May 22, 2025

You may have missed

chinese-hackers-attacking.jpg
  • The Hacker News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

[email protected] The Hacker News May 22, 2025 0
exploitss.jpg
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

[email protected] The Hacker News May 22, 2025 0
chinese.jpg
  • The Hacker News

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

[email protected] The Hacker News May 22, 2025 0
cyber-program.jpg
  • The Hacker News

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

[email protected] The Hacker News May 22, 2025 0
Copyright © 2025 All rights reserved. | MoreNews by AF themes.