Safeguarding against the insider threat

The insider is still one of the most vulnerable elements of cybersecurity and it was the discussion of the recent […]

Full Details

Key security strategies for data breach prevention

If we have learned anything over the last few years about data breaches, it is that they are likely to […]

Full Details

The missing leg – integrity in the CIA triad

Information security is often described using the CIA Triad. The CIA stands for Confidentiality, Integrity, and Availability and these are […]

Full Details

The case for consistency in security

Security spending could be compared to the stock market. It increases and decreases depending on intangibles such as how “at-risk” […]

Full Details

Essential Computer Security at the Untangled Conference

I welcome you to join me on November 8 at Grace Baptist Church of Westlake for the Untangled Conference.  I […]

Full Details

Is staying safe online possible?

I was asked a question on Twitter today. The question was, “Is staying safe online possible?” This is a great […]

Full Details

Data breach threats of 2013

A recent study by Deloitte, titled Blurring the lines: 2013 TMT global security study, shows that 59% of Technology, Media, […]

Full Details