12 Posts

Paul Gillin

Partner, Gillin + Laberis

Paul Gillin is a speaker, writer and B2B content marketing strategist who specializes in social media. He is the author of five books and more than 300 articles on the topic of social and digital marketing. He was the social media columnist for B2B magazine for seven years and is currently a staff columnist at Biznology.com. He also writes regularly for the tech news site SiliconAngle. Previously, Paul was a technology journalist for 23 years.

Written By Paul Gillin

February’s Top Cybersecurity News Stories: Nice Phish You Got There

Last month's cybersecurity news cycle featured a tricky cryptocurrency-stealing Trojan, targeted phishing attacks, interesting insights about millennials' identity protection habits and more.

Read My Lips: Researchers Find Ways to Fool Speech Recognition Systems

Researchers have devised ways to manipulate speech recognition systems to carry out hidden commands, suggesting that cybercriminals will soon develop similar ways to exploit this technology.

January’s Top Cybersecurity News Stories: Jackpotting, Cryptocurrency Mining and Other Emerging Trends

The start of February is a great time for organizations and individuals to sweep away the confetti and dig into the most significant cybersecurity news stories from the past month.

Moving Target Defense: A Digital Shell Game

Moving target defense constantly shifts the environment surrounding sensitive data, making it harder for would-be attackers to identify vulnerabilities.

Wireless Security Lessons From the WPA2 Vulnerability

One of the biggest WPA2 vulnerability wireless security lessons: Few people are aware, fewer know how to patch it and fewer still will do so.

Have We Been Wrong All Along About Good Password Practices?

In its new guidelines on secure password practices, NIST recommended using long strings of random words instead of a combination of characters and symbols.

How Virus Protection Software Has Evolved With the Threat Landscape

Virus protection software has come a long way in the past 30 years, and the advent of machine learning represents a bright future for malware fighters.

Don’t Leave Home Without These Five Travel Security Tips

Tourists should follow these travel security best practices to protect their devices and data from cybercriminals, especially in foreign countries.

The Enterprise Mobility Conundrum: How to Control the Data?

Businesses can benefit from BYOD policies, but IT leaders must implement the right enterprise mobility solutions to protect their sensitive data.

Two-Factor Authentication: A Little Goes a Long Way

Online services are understandably reluctant to add steps to the login process, but a little two-factor authentication can significantly boost security.