Does Discussing IT Security Spending Have to be Extremist or Establishment?
Hi, what are you looking for?
Does Discussing IT Security Spending Have to be Extremist or Establishment?
Like Many Compliance-driven Efforts, Access Certifications are Often Hastily Implemented to Satisfy Auditors...
Like Many Security Technologies, Access Governance Won't Directly Drive More Revenue for a Business. So How Can You Deliver a Return on Governance?
As we head towards the end of the year, the annual rising of mobs of people pushing and shoving to get what they want...
As humans, we all have biases that threaten to overrule sensible decision making. The list of cognitive biases on Wikipedia numbers well over 150.
Rumors of the password’s demise have been greatly exaggerated over the years. As security professionals, we know how fragile they are in the hands...
I recently attended yet another security conference where a vendor triumphantly declared that “identity is the new perimeter”. As often as this statement has been...
As security professionals we worry about zero-day exploits - those vulnerabilities known by attackers for which there is no current fix. The zero day,...
Does it really matter if someone steals your healthcare records? What would a hacker do with that information? Sell it? To whom and for...
The 4th of July is approaching, a U.S. holiday celebrating independence from the British. But sometimes the first war doesn’t solve all the problems....
Image Credit: AC72 Sail 4 / Foiling / ORACLE TEAM USA / San Francisco (USA)Guilain Grenier Oracle Team USA ©