The Most Important Element of Information Security Success
As a CISO, I am often asked, “What is the key component to the success of an Information Security organization?” Too often, we dwell on the failures or gaps, and…
As a CISO, I am often asked, “What is the key component to the success of an Information Security organization?” Too often, we dwell on the failures or gaps, and…
The story about the Office of Personnel Management getting hacked this week was, unfortunately, not a big surprise to anyone in the security world. How it got hacked, by phishing,…
Do you know how Merriam-Webster defines vacation? Believe it or not – this is what it says: – A period of time that a person spends away from home, school, or…
In my last article, I talked about using the 20 Critical Controls as a practical security strategy. I showed how the controls map to a wide variety of international and…
I frequently talk to myself. I think that this is mostly OK, except when I have an argument. The other day, I asked myself, “Who am I?” and I was…
Why did the chicken cross the road? To add 200 more steps to his daily wearable device count! But did the chicken ever stop to think about the impact to his…
The recent Sony breach attributed to North Korea is only the latest in a series of Sony hacks that trace back to 2005. Most news stories point to the recent…
It’s now commonplace to read that security means more than checking off boxes on a compliance checklist. A robust approach to security includes trying to fill the gaps between the…
I’ve been around the computer business for a long time. Way back, before the Web and even before computers, if you wanted to send a secret message to someone, you…
Nowadays, data breaches are a subject of conversation at dinner tables and in boardrooms. Cyber insurance premiums to cover these breaches are skyrocketing. Recent surveys and breach reports have highlighted…