ExpertOps: More Security with Less Time

When you work for the office of your organization’s chief information security officer (CISO), time is not your friend. In 2015, the average time from compromise to discovery of a security incident ...
12 Top Talks from the 2017 Retail Cyber Intelligence Summit

12 Top Talks from the 2017 Retail Cyber Intelligence Summit

On October 2-4, 2017, the Retail Cyber Intelligence Sharing Center (R-CISC) hosted Securing Retail 002, the second iteration of its annual summit first held in April 2016. Speakers from Microsoft, Target and ...

Security Is a Team Sport

If you’ve read a security blog anytime in the last year, you haven’t escaped mention of the dreaded skills gap for cybersecurity professionals. There seems to be consensus that it’s getting harder ...
The State of Security
How Harmless Is Your Company’s Paramount Data?

How Harmless Is Your Company’s Paramount Data?

In today’s rapid technological evolution, information from particular sources can be easily accessed, copied and shared out to a larger audience. If an organization fails to complete its basic role of being ...
The State of Security

Workplace Health and Safety a Vital Component of Mature Risk Management

Businesses of all types are being transformed by technology, and so are the many kinds of workplaces that support their operations. Changing business strategies and increased productivity lead to rapid changes in ...
Man Uses BackHoe to Try to Break Into ATM

Evolution Of ATM Theft: Sledgehammers To Skimmers

Over 10 billion transactions are performed every year at ATMs, and there are over 425,000 of these cash-dispensing machines throughout the U.S. for a total of 3,000,000 used globally. ATMs hold anywhere ...
The State of Security

What is the State of Your Union?

Regularly the President of the United States delivers the State of the Union address. This practice "fulfills rules in Article II, Section 3 of the U.S. Constitution, requiring the President to periodically ...
7 Things To Consider When Creating An Acceptable Use Policy

7 Things To Consider When Creating An Acceptable Use Policy

If you have read any of my posts or attended my webinars about security awareness, training, compliance, or other IT risk management items, you will notice a recurring theme: expecting technology to ...
The State of Security
My Comfort Zone is an uncomfortable place to be…

My Comfort Zone is an uncomfortable place to be…

More years have passed than I care to remember since I graduated and started looking for my first job. Unfortunately, the IT market was not doing that good and I was struggling ...
Loading...