How Not to Gamble with Your IT Security Strategy
It’s no secret that I love Las Vegas and all it has to offer including gambling. To me, this is a natural affection due to what I do in my…
DetailsIt’s no secret that I love Las Vegas and all it has to offer including gambling. To me, this is a natural affection due to what I do in my…
DetailsIn the first two parts in my series, a “Path to a Career in Cyber” and a “Path to a Career in Cyber Part and Then Some,” I explained how I…
DetailsPart one in the series Path to a Career in Cyber can be read here In my first article “Path to a Career in Cyber” I explained how I got into IT and…
DetailsIn some cases, hiring a project manager is the most sensible thing you can do. A seemingly can’t miss action that preserves the status quo while getting the organization where…
DetailsThe only thing worse than being blind is having sight but no vision – Helen Keller According to a newly released report, 54% of security professionals said they were under…
DetailsPresident Obama wants private sector companies to share information about cybersecurity threats with each other – and the government. That sounds like a novel idea – and some industries already…
DetailsWhen I started my career in the US Navy, almost three decades ago, I originally went into the field of advanced electronics. It was close to what I wanted to…
DetailsI watched the latest show in the “CSI” franchise last night – CSI: Cyber (on CBS) and my thoughts were “There goes the neighborhood.” I must say that I’m not…
DetailsA company I know was audited some years ago. One of the findings was that there were no Unix server logs. Over the next year server logging was enabled. The…
DetailsAs a CISO, you will find your job requires you to have experience in many areas. As the leading cyber security executive for your organization you will be expected to…
DetailsIt’s 2 in the morning. You are stopped at a well-lit, completely empty intersection looking up at a red light. If you’re like me, you will wait till that light…
DetailsI read an article recently about how a CISO talked his way out of having an internal auditor write up a finding about weak passwords – which eventually lead to…
Details