I used to keep bees. I turned in my veil and smoker one July afternoon after a ride in an ambulance, laying on a...
Hi, what are you looking for?
I used to keep bees. I turned in my veil and smoker one July afternoon after a ride in an ambulance, laying on a...
Security isn’t Binary. The Trick is to Find the Breakeven Between Expenditure of Resources and the Point of Diminishing Returns...
Specifics are Critical to Understanding the Threat, Responding to It, and Assessing The Impact...
There’s No One Size Fits All Disaster Survival Plan: Every Incident Requires A Situationally Appropriate Response...
A colleague of mine has strict ideas about how he manages the security of his assets, both information and physical. He has two bank...
Security Should Fascinating, Dynamic, and Creative. Have Fun, Be Criminal In Your Thoughts, But Not Your Actions...
Part Two In A Series, Please See Part One - Big Data, Little Devices: Security Analytics Enable Health Care Transformation
Part 1: Why the Star Trek Medical Tricorder Didn’t have an App Store
Imagine walking into your bank’s local branch office, sliding a carton across the counter containing vegetables from your refrigerator drawer, a diamond necklace, and...
You decide to eat at a restaurant that not only gets good reviews, but is highly recommended by a few of your friends. The...
Why doesn’t Everyone have Security Intelligence? One of the Reasons is Superstition.“Step on a crack, break your mother’s back.” Not just lyrics by Devo,...
There’s a Ton of Unstructured Data in the World - We Should All Tap Into Our Inner Analyst to Devise and Embrace New Categorization...
Data diodes can create architectural complexity despite design simplicity of the data diodes themselves, but do they increase security?
When the Executive Board Asks you Where your Turtle is, will You be Able to Answer Immediately and with Confidence?I was outsmarted by a...
What Happens When Data is Separated from the Systems and Applications that the Data Owners control?Cloud computing, virtualization, mobile devices, and social networking are...
As Long as Attackers are Organized and We’re not, We’re Losing an Asymmetric War.
It won’t be long before attackers discover that your home automation system is connected to everything.
- Getting The Most From Your SIEM Solution -A typical SIEM deployment conversation may look something like this: Vendor: Ms Customer, now that you’ve...
SIEM vendors are all jumping on the Security Intelligence tag line, but what does it really mean? The bad guys are getting more sophisticated...