Using Trust Interfaces to Build an IT Security Strategy
Posted on: 11 Apr 2014
After presenting this week at InfoSecWorld 2014 on Why Risk Management Fails, I was asked by a frustrated risk management professional how to build an IT security program. The days…
The Latest on the Heartbleed Bug
Posted on: 10 Apr 2014
In the days since the Heartbleed Bug, a vulnerability in OpenSSL heart beat function, was exposed we have begun to see signs of the Internet bleeding out. Bruce Schneier ranks…
Heartbleed Vulnerability is a Major Heartache
Posted on: 08 Apr 2014
The announcement yesterday of a widely deployed vulnerability in OpenSSL, the Heartbleed Bug, is set to shake up the security industry. According to the discoverers at Codenomicon and Google, all Apache…
Firewall Policy Management Evolves to Security Policy Orchestration
Posted on: 07 Apr 2014
This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors…
Cyber Policy Experts to Follow on Twitter
Posted on: 05 Apr 2014
The emerging field of cyber policy is attracting government, academic, and technology experts. Here is a list of cyber policy experts from around the world who are well worth following…
Breach Detection Report From NSS Labs Defines Winners/Losers
Posted on: 04 Apr 2014
NSS Labs has issued the first test results of Breach Detection Systems (BDS). Breach Detection, sometimes called Advanced Malware Defense, is usually a gateway device that inspects downloaded executables by…
Why Is Congress So Hot on Information Sharing?
Posted on: 03 Apr 2014
A perplexing question for those in IT security is why are so many in government pushing for “information sharing” as their solution to the cyber crisis? The crisis is apparent…
Where Are the US Tech Heroes?
Posted on: 02 Apr 2014
It has been three months since the world learned that the NSA’s Signals Intelligence Directorate, through its Tailored Access Operations (TAO) has been deploying backdoors in Cisco, Juniper, Huawei, Dell,…
Never The Twain Shall Meet: Why Network Security Vendors Should Stay Away From End Point Security, and Vice-Versa
Posted on: 01 Apr 2014
There would be many more successful security companies if their founders and leaders had a better understanding of the IT security space. One fallacy that will not die is the…
How Symantec Can Pull Out of a Tail Spin
Posted on: 24 Mar 2014
It should come as no surprise to anyone that Symantec’s recently fired CEO Steve Bennett’s strategy of cut costs and improve operations has failed miserably. As I wrote when Symantec’s…