Security for the Holidays
The holiday season is filled with opportunities for the Bad Guys to take advantage of people who are filled with the holiday spirit, out and about having a good time…
The holiday season is filled with opportunities for the Bad Guys to take advantage of people who are filled with the holiday spirit, out and about having a good time…
For those contemplating using Amazon Web Services (AWS), their compliance page is quite assuring. With a who’s who of compliance standards from SSAE-16, ISO 27001, PCI DSS, to CSA, MPAA,…
It is more important than ever to safeguard your business. As the drumbeat of news about breaches continues, the stakes have never been greater. You must stay a step ahead…
Aggregating is the inverse of broadcasting. What complicates this is that many technologies are now used for both. Cell phones are the best example. They are a device originally designed…
At some point, I must have drunk the Cloud Kool-Aid. I find that despite my best efforts, I no longer develop the sinking feeling in the pit of my stomach…
Ok, I know the title sounds a little negative. I’m not against cloud services at all. We use cloud services here for a wide variety of business and personal purposes.…
As security practitioners, we know that nary a day goes by when our schedule for the day (or week) goes as planned. There is always an alert to address, an…
I’ve been known to say that ‘I’ve been in InfoSec since before it was cool.’ After 20 years of being on the front lines, first as a consultant, then as…
If we live in a data-centric world, it is still true that data are more immediate for some than for others. To use one individual as an example: by the…
Someone recently pointed out an article to me: ‘Big 12 beats Ivy League – in cybersecurity’ I didn’t realize that there was a competition between schools as to who does…