Adults today have witnessed video stores becoming streaming services, book stores vanishing into cyberspace. Traditional, even beloved, consumer brands are being supplanted by digital...
Hi, what are you looking for?
Adults today have witnessed video stores becoming streaming services, book stores vanishing into cyberspace. Traditional, even beloved, consumer brands are being supplanted by digital...
Allow me to nitpick for a moment: There’s a difference between data and information. Data are the facts or details from which information is derived....
Last month, I talked about the elegant beauty in offloading parts of your risk portfolio in four distinct ways.
Previously, I’ve talked about four primary risk treatment options: mitigate, avoid, accept, and transfer. Over the history of the security industry, we’ve tended to focus...
Performing a Risk Analysis and Taking Due Care Are No Longer Optional Now hear this: You will always have exposure.
For years I wondered why business groups would move forward with technology initiatives before fully understanding their risk exposure. Focused on the business outcome,...
Whether it’s coming from the business units or the IT organization, every company wants to pull off new tech initiatives to create business impact....
My name is Preston Hogue, and I’m a user.(And so are you.)
When I first started working in private sector security after leaving the military, I took an approach that I see a lot of CISOs...
For a couple of decades now, the career path of a cybersecurity professional has been evolving just like the rest of the tech industry....
As organizations move to the cloud, one of the biggest changes we’ve seen is in the nature of the application landscape. This is the...
Traditional Network Defenses Can’t Mitigate the Majority of Data Breaches.