An Honest Approach to the Post-Breach Letter

Editors Note: This blog is a work of fiction/humor and was originally published as such on the Cylance ThreatVector Blog, May 24, 2019, by Tag Cyber.   To Our Compromised Customers: Our team at (insert company name) tried to secure its computer systems behind an...

Wi-Fi as the On-Ramp to 5G

The 5G rollout is advancing along two independent, parallel fronts: an evolutionary development of the air interface, known as 5G NR (“New Radio”), and a fundamental reconceptualization of the core network architecture. These two paths have been explicitly and...