Risk Management
Next Generation Security
Cybersecurity breaches seem to occupy too many headlines these days. There seems to be so many attention-grabbing examples of how inadequate information, applications, and IT security can impact our businesses. There is documented evidence that security breaches can affect brand, marketplace trust, customer privacy and identity, not to mention the bottom line. The proliferation of…
Read MoreWhy your Cybersecurity strategy needs DevOps
A chain is only as strong as its weakest link In the past few years, leaders have accepted that the human error is the biggest security risk to an organization, and organizations have responded with valuable policies and programs such as security awareness training and multi-factor authentication. Necessary, but not sufficient. Organizations must continue implementing more robust security measures, expanding…
Read MoreWhat Do Castles and Internet Security Have in Common?
For the past two decades myself and a handful of others have been preaching the fact that organizations must look at security through a different set of glasses. For too many years we’ve been enamored with the bright shiny objects created by Symantec, IBM, Checkpoint and other technology companies where they want to keep the…
Read MoreEssential Elements of a Cybersecurity Program
Cybersecurity is getting a lot more attention these days, even if it is not all the attention it deserves. (Did you know that breaches are still increasing faster than spending on cybersecurity? Some of the best data in this space comes from the federal government – here’s a good synopsis: Federal Cybersecurity Breaches Mount Despite…
Read MoreDepending on Open Source software is Risky Business (and Heartbleed proves it!)
By all accounts, Heartbleed is the worst security flaw in the history of the Internet. What it is and why it is so bad has been talked about ad nauseum, so I won’t bore you with those kinds of details, but here are a couple places to learn more about it if you are not…
Read More