Safeguarding against the insider threat

The insider is still one of the most vulnerable elements of cybersecurity.  Insiders are those who are authorized to work […]

Full Details

Key security strategies for data breach prevention

If we have learned anything over the last few years about data breaches, it is that they are likely to […]

Full Details

The missing leg – integrity in the CIA triad

Information security is often described using the CIA Triad. The CIA stands for Confidentiality, Integrity, and Availability and these are […]

Full Details

The case for consistency in security

Security spending could be compared to the stock market. It increases and decreases depending on intangibles such as how “at-risk” […]

Full Details

Essential Computer Security at the Untangled Conference

I welcome you to join me on November 8 at Grace Baptist Church of Westlake for the Untangled Conference.  I […]

Full Details

Is staying safe online possible?

I was asked a question on Twitter today. The question was, “Is staying safe online possible?” This is a great […]

Full Details

Data breach threats of 2013

A recent study by Deloitte, titled Blurring the lines: 2013 TMT global security study, shows that 59% of Technology, Media, […]

Full Details

Who’s stealing your data?

Here is a fact that many of us would like to forget.  Most data theft occurs by insiders.  This is […]

Full Details

Blind Security: A case of site intimidation

Every once in a while, a website will try to convince you to change your security settings.  I was looking […]

Full Details

Developing a Security Oriented Corporate Culture

  Managing the security of an organization can be quite confusing. It can seem like an uphill battle when basic […]

Full Details

Environmentally Conscious Security: Painting Information Security Green

Historically, ecological concerns have been significant drivers for change.  Topics ranging from global warming to protecting various species carry a […]

Full Details

A Certified Lack of Confidence: The Threat of Rogue Certificate Authorities

For more than a decade, computer-generated digital certificates have made it possible to authenticate the identity of computer systems, data, […]

Full Details

Risk Homeostasis and its impact on risk reduction

Gerald Wilde had a theory called risk homeostasis.  This theory hypothesizes that people have a level of acceptable risk.  When […]

Full Details

Is Your TV a Security Risk? IoT May be the Next Threat

The latest televisions and Blu-Ray players come equipped with more than HD video and audio.  Internet access and a host of […]

Full Details

iPad Enterprise Security

“Thinner. Lighter. Faster. Facetime. ” That is the catchphrase from the Apple page dedicated to the iPad. While Apple is […]

Full Details

LulzSec Hacking of Sony

Thank you for staying tuned into our third case study and final installment of our four-part series on the Lulz […]

Full Details

LulzSec Hacking of Infragard and Univeillance

This post is the third part of a four-part series on the LulzSec hackers. Our first entry titled “Awareness Pains: […]

Full Details