IoT Security: Think Beyond Data
In today’s Internet of Things (IoT) world, every device can communicate and be connected to the Internet – from your refrigerator to your lights and cars. IoT’s glitter is often…
In today’s Internet of Things (IoT) world, every device can communicate and be connected to the Internet – from your refrigerator to your lights and cars. IoT’s glitter is often…
In Part I, I gave you some food for thought about getting your message out there in a clean, crisp, and concise way. In the second installment of my Open…
Privacy folks and security folks were finally intermingling by design and not by accident or through one or the other being adventurous. I’m a huge proponent of the two being…
All financial institutions and retailers are looking for solutions to protect credit card and other sensitive data from the moment the magnetic stripe of the payment card is swiped through…
As a CISO or an executive responsible for the Information Security organization at your company, one thing that you ought to keep in real focus is the Silo Effect. Be…
By now most of us have heard of the phrase kill chain. For those of you that haven’t heard of it, the kill chain is a phase-based model used to…
Life on a college campus changes in the Fall. In a way, just like the seasons, life in higher ed is very cyclical, and the beginning of the semester is…
Over the past few years, there has been an uptick in cybercrime on a mass scale, with hackers gaining access to personal information of millions of people. Breaches at well-known,…
A few weeks ago, my son and his family came to visit us from Japan (he is a Captain in the Marine Corps and stationed there). We took a day…
So tell me – did you hear the news?? Apparently the rumors are indeed true. 2015 is the year of the Security Startup. And in the words of the greatest…