BrainWave Consulting Company, L.L.C.
  • Home
  • About
  • Services
  • Free Utilities
  • Blog
  • Contact
Select Page
Reading Between the Lines of Breach Notifications

Reading Between the Lines of Breach Notifications

by Andrew S. Baker | Jan 18, 2013 | Compliance, Data Privacy, Security

Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance of How & When Sadly, to many organizations are doing something...
Get Real with Information Security

Get Real with Information Security

by Andrew S. Baker | Dec 31, 2012 | Risk Management, Technology

In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased number of attacks. Not incidentally, mobile devices just flew off the shelves this year,...
It’s Time to Re-evaluate Host-based Security

It’s Time to Re-evaluate Host-based Security

by Andrew S. Baker | May 10, 2010 | Software, Technology

I’ve said it for a few years now, but host-based antivirus is really not working out anymore.  Not with its reliance on signatures to detect malware. Recently, several prominent antivirus vendors have experienced problems with faulty virus definitions: ...

Search Posts

Recent Posts

  • FileHash: Major Update v5.0
  • Increased Vigilance is Strongly Recommended
  • Protecting and Recovering Your Social Media Accounts
  • CyberSecurity 102 for Small Businesses
  • CyberSecurity 101 for Small Businesses
  • Yes, You Need to Understand Technology Architecture

Archives

Categories

  • Business Management (4)
  • Career Management (6)
  • Compliance (11)
  • Corporate Culture (7)
  • Data Privacy (15)
  • Government (3)
  • Hardware (6)
  • Humor (1)
  • IT Operations (11)
  • Lead Generation (1)
  • Multifactor Authentication (2)
  • Personal (4)
  • Policies and Procedures (10)
  • Risk Management (22)
  • Sales and Marketing (1)
  • Scripting and Automation (4)
  • Security (36)
  • Software (14)
  • Strategy (27)
  • Technology (42)

Tags

Breach Breach Notification Business BYOD Cloud Computing Compliance Cybersecurity Data Privacy Deployments Development Governance Identity Theft Incident Response Information Security Information Technology Infrastructure Integration Investments IT Operations Job Market Leadership Malware Management Migrations Mobile Computing News Password Management Personal Policies Project Management Rants Recruitment Resources Risk Assessment Risk Management Risk Mitigation Security Shell Scripting Software Staffing Strategy Technology Utilities Vulnerabilities Webinar
  • Home
  • About
  • Services
  • Free Utilities
  • Contact
  • Facebook
  • X
© 2025 BrainWave Consulting Company, LLC - All Rights Reserved | Website designed by Spencer Taylor