This move to container-based development and agile methodologies has been great for innovation and iteration, but it’s also brought a massive shift in the...
Hi, what are you looking for?
This move to container-based development and agile methodologies has been great for innovation and iteration, but it’s also brought a massive shift in the...
As it’s been said, we’re trying to have a civilization here. So, what is the foundation of a society? Is it the economy? Personal relationships?...
There’s no doubt your information is out there. And at a certain point, you have to assume it’ll be exposed.
Those of us at a certain age (ahem) grew up in a simpler time. Email was largely unheard of. There was no social media,...
It’s always interesting to watch how the ongoing digital transformation of our lives is changing the world in ways we never would have anticipated...
Technical Hacks to Compromise Sensitive Systems Are Just One Tool in a Much Larger ToolkitIn simpler times, cybersecurity was a fairly straightforward proposition. You...
As the world’s ongoing conversion to the digital realm continues, the risks involved with protecting sensitive information will only intensify.
If you think everything’s gone cyber now, just wait. “Digital transformation” is shifting all aspects of modern life — think automated grocery stores, driverless...
Adults today have witnessed video stores becoming streaming services, book stores vanishing into cyberspace. Traditional, even beloved, consumer brands are being supplanted by digital...
Allow me to nitpick for a moment: There’s a difference between data and information. Data are the facts or details from which information is derived....
Last month, I talked about the elegant beauty in offloading parts of your risk portfolio in four distinct ways.
Previously, I’ve talked about four primary risk treatment options: mitigate, avoid, accept, and transfer. Over the history of the security industry, we’ve tended to focus...