Maybe it’s my actuarial background, but I’ve always seen IT security as an activity that should work hand-in-glove with insurance. After all, both domains...
Hi, what are you looking for?
Maybe it’s my actuarial background, but I’ve always seen IT security as an activity that should work hand-in-glove with insurance. After all, both domains...
Think About Survivability and Design Your Network for Resilience as Threats Change...
How Have You Done at Securing Your Network this Year?
Have you seen the spat between Wyndham Hotels and the Federal Trade Commission? Wyndham already suffered a painful and public breach, dating back to...
After my last column complaining about the hype to delivery ratio in Big Data for security analytics, I seem to have convinced some people...
Hi, my name is Mike, and I’m a big data skeptic – especially when it comes to security. It’s pretty clear this puts me...
Risk Management isn’t Just an Obligation, or Something other Execs Want to See...When Done Right, It really works.
I recently wrote in this space about the rise of the phrase “continuous monitoring” and the confusion it causes. In a nutshell, federal organizations,...
I just finished two weeks of travel – part in Washington DC, part at a Wall Street conference. In both arenas, continuous monitoring is...
There is a shift going on in the security business. It’s been a slow-moving wave for a while now – a shift from reactive...
I recently had the pleasure of traveling in the Pacific Northwest to conduct several visits with top network security teams. I enjoy making these...
There is No Stopping the BYOD Wave. The Difficulty is the Complexity Involved...