All Infrastructure and the NIST Framework
Each infrastructure is critical to someone. Go ahead: ask a CIO if they are in charge of something other than “critical infrastructure” and see what they say. In fact, the…
DetailsEach infrastructure is critical to someone. Go ahead: ask a CIO if they are in charge of something other than “critical infrastructure” and see what they say. In fact, the…
DetailsMy friend Randy Marchany tweeted a link to an article “Millennials Value Speed Over Security, Says Survey” that started me thinking about the apparent conflict between speed and security. If…
DetailsIt’s impossible to build out a really strong IT security program without the solid foundation of a great security team. Pritesh Parekh, VP and CSO of Zuora, winner of the…
DetailsTry and do an information security risk assessment of a law firm your company uses. Give them an InfoSec security questionnaire to fill out and request key information security documents. And…
DetailsI was looking at Facebook the other day (yes, I know – a security guy that uses Facebook – just wait until you have grandkids and a scary message appeared…
DetailsPasswords are not a means of securing information. Bill Gates told us this in 2004, but it’s 2016 now and this time, we really mean it. Gates’ reasoning was that passwords…
DetailsGlenn Fink, a security researcher at Pacific Northwest Labs, did a presentation called the “Internet of Cows” at a recent IEEE conference where he showed how dairy farming has become an automated,…
DetailsWho knows you better than your smart phone? Your family? Maybe. Your colleagues? Perhaps. Your dog? Almost certainly—but that could change very soon. For many of us, our phones and…
DetailsDavid M. Brown reported on April 1, 2016 in Data Breach Notification Laws that the State of Tennessee has passed and received the Governor’s signature on revisions to its breach…
DetailsPeople love to predict the next must-have digital device, from personal drones to augmented-reality contact lenses. But what if the next big device isn’t one single technology? What if it’s…
DetailsThis seems to be the time of year that everyone is holding a security conference. I will be attending eight from January through the end of April (and speaking at…
DetailsThird-party vendors are essential to businesses big and small, national and global. Outsourcing is big. Offshoring is big. You can’t just move or outsource part of your business halfway across…
Details