So…. I finally had a chance to finish reading the latest full edition of Microsoft’s latest Security Intelligence Report. There’s a lot of really good info in the report. The executive summary also does a good job of highlighting key points. That said, I had a couple...
If there is one lesson that technologists need to understand in order to be successful, it’s that business is ultimately more about people than about process or technology. At the end of the day, how people think, behave and operate will have be the greatest...
A holistic approach to information security needs to address a corporate strategy for buying or building solutions. Such a strategy will have an impact on how a company looks at staffing and technology investments. There are two basic ways to look at major investments...
In recent years, it has become popular sport to blame information technology (IT) departments and IT leaders for failures – real or imagined – which adversely impact business operations. Even some technology trade journals seem unable to get through a single issue...
Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance of How & When Sadly, to many organizations are doing something...
In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased number of attacks. Not incidentally, mobile devices just flew off the shelves this year,...
Earlier this week, I read an article about unemployment and the struggles of those coming out of college and graduate school who are seeking jobs. A surprising number of people were simply spouting the rhetoric that people who don’t have jobs are simply lazy and...