Tag: Contributors
-
Cybersecurity’s believe it or not
There is a quote by astrophysicist Neil deGrasse Tyson that has always resonated with me. “The good thing about science,” he stated, …
-
Cyber Threat Intelligence (CTI) – Part 2
In part one, I outlined what CTI is and where it can be acquired to demonstrate its value. Here I will dive deeper into how organizations …
-
Are you giving useful advice?
If you can’t measure it, it’s not actionable. If it’s not actionable, it’s not …
-
Why Open Source Technology is the Key to Any Collaboration Ecosystem
Open Source Collaboration Ecosystem Open source – software whose source code is public and can be modified or shared freely – is a hot …
-
The interdependency of people, policy and products amid a cybersecurity talent shortage
Several CISOs I’ve spoken recently have lamented, while cybersecurity assurance stands on three legs – people, policy and products – …
-
Dealing with a shortage of information security and IT skill sets
After talking about the CISOs role in mergers and acquisitions, it’s time we examine the shortage mentioned above, offer short and …
-
The risk of okra
“IT Risk is well defined by the ISACA organization in the Risk IT Framework. It says, “IT risk is business risk—specifically, the …
-
GDPR Compliance: A Network Perspective
GDPR Compliance Regulations can be a tricky thing. For the most part, they’re well thought out in terms of mandating actions that a …
-
What you’re doing to protect your data isn’t working
To address the confidence gap that exists between IT and executive leadership, there’s a much-needed dialogue that needs to occur in …
-
Who wins in a world of 100% encrypted traffic?
According to Google, over seventy-five percent of requests to its servers are encrypted and Mozilla reports that over 55 percent of the web …
-
How you can detect hackers in your encrypted traffic
Decrypting and re-encrypting SSL traffic to find an attack only adds requirements for processing the traffic, which can ultimately clog up …
●●●