Stories by Doug Drinkwater

6 use cases for blockchain in security

Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection.

Written by Doug Drinkwater06 Feb. 18 22:00

6 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.

Written by Doug Drinkwater22 Jan. 18 22:00

10 steps for a successful incident response plan

Incident response plans are often left unused, leaving firms far less able to detect and respond to cyber attacks or data breaches. Here’s our 10-point plan to ensure you set up -- or improve -- an IR plan that actually works.

Written by Doug Drinkwater27 June 17 00:35