Patching isn't working and end-users ignore breaches, says ex-NSA security VP David Venable
Vendors need to be liable when their software is breached, says David Venable

Venable worked as an intelligence officer for the NSA for six years
David Venable, VP of cyber security at network provider and security firm Masergy, thinks that the world's approach to patching is broken, and the evidence - data leaks and exploits like WannaCry - speaks...
More on Threats and Risks
MI5: Spies are using LinkedIn to steal secrets from UK nationals
As many as 10,000 Brits have been targeted, including security and military officials, civil servants, defence contractors and pharmaceutical industry experts
Rising ransom-related DDoS threats: how to best prepare
RDDoS attacks often come out of the blue, but there are a few key ways you can best prepare for them
Understanding what drives teen hackers is key to securing your business, says cyber expert Shelton Newsham
Natural curiosity can lead some to open some wrong doors
Securing your investment in Microsoft 365
There’s a lot of sensitive data contained in Office documents - so it makes sense to take care of it
Apple releases urgent security patch for zero‑day bug under active attack
The bug exists in Webkit, the browser engine which powers the Safari browser across all Apple devices
Back to Top