Risk Averse. Rule Averse.
It’s 2 in the morning. You are stopped at a well-lit, completely empty intersection looking up at a red light. If you’re like me, you will wait till that light…
It’s 2 in the morning. You are stopped at a well-lit, completely empty intersection looking up at a red light. If you’re like me, you will wait till that light…
I read an article recently about how a CISO talked his way out of having an internal auditor write up a finding about weak passwords – which eventually lead to…
According to Wikipedia, “The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. Typically, IoT is expected to offer advanced connectivity of devices, systems, and…
The list of security products and technologies resulting from searches by even the least sophisticated Internet Search Engines across any of the major security product categories can be quite overwhelming.…
My biggest security problems all start with authentication. If you look at the major hacks that have taken place in the last year, you can trace most of them back…
I have always found that information security professionals tend to fall into three categories: SWAT Teams, Power Rangers or Nerds with an edge (see a blog post of that name…
BCP. Three little letters that, unfortunately, strike mind-numbing boredom into most CIOS’s. The truth is, Business Continuity Planning isn’t synonymous with the excitement that is typically found in the Information…
Back in the late 1990’s, I was fortunate to be part of a team of cyber security experts who were asked to develop a list of the Top 10 Internet…
It’s not a matter of if your company will be breached but when and for newly established companies or startups the when may be sooner rather than later. Startups are…
In a November 2014 article, Lowell McAdam the CEO of Verizon made the following very bold public statement, “It’s Wrong That in a Room of 25 Engineers, Only 3 Are…