5 Days Left to Save $400 on SANS Virginia Beach 2016

SANS Security Trend Line

Twelve Word Tuesday: Don't Be the "Dog That Caught the Car" When Board-Briefing Opportunity Arises

Having something board-worthy to say: Are you collecting business relevant security metrics? Free SANS CISO Hot Topic Session with CISCO CISO Steve Martino, SANS Founder Alan Paller and SANS Director John Pescatore Tuesday 14 June: "Communicating to and Influencing CEOs and Boards of Directors: What Works and What to Avoid" Continue reading Twelve Word Tuesday: Don't Be the "Dog That Caught the Car" When Board-Briefing Opportunity Arises


Twelve Word Tuesday: Why Are US Elected Officials Resorting to "Bring Your Own Security" for Basic Security Hygiene??

. Fifteen year's Federal PKI spending - Congresspersons must look for BYO encryption apps? . Reps. Will Hurd (R-Texas) and Ted Lieu (D-Calif.) "Dear Colleague" letter to the entire House of Representatives on basic security hygiene. Continue reading Twelve Word Tuesday: Why Are US Elected Officials Resorting to "Bring Your Own Security" for Basic Security Hygiene??


Progress in Using the Critical Security Controls to Sort Out "Security Bad Apples"

In the past six months or so, there has been a lot of forward movement in state and federal government around the idea of screening suppliers and contractors for "basic security hygiene" as embodied in the Critical Security Controls. Most importantly, new federal procurement regulations will go into effect June 15th that directly require contractors … Continue reading Progress in Using the Critical Security Controls to Sort Out "Security Bad Apples"


Twelve Word Tuesday: Watson, Come Here - I Need Your Password

Software smart enough to win Jeopardy - probably still dumb enough get phished? Article here: IBM to work with universities to train Watson AI on cybersecurity. Continue reading Twelve Word Tuesday: Watson, Come Here - I Need Your Password


Twelve Word Tuesday: Advising the Next President on Top 3 Things Government Agencies Should Do In Cybersecurity

Use: stronger authentication (non-PIV!) Application Stores. ISP services that filter known bad. Continue reading Twelve Word Tuesday: Advising the Next President on Top 3 Things Government Agencies Should Do In Cybersecurity