iPad Air 2, Samsung Galaxy Tab A, or $350 Off with SANS Online Training Right Now!

SANS Security Trend Line

The January Trend Ritual: Reviewing the Past, Forecasting the Future

"I have seen the future and it is very much like the present, only longer." -Kehlog Albran, The Profit Since I use the word Trends in this blog title, I'm legally obligated to review my past predictions and make new ones for 2014. So, here's Part I, a look back at the trends I predicted … Continue reading The January Trend Ritual: Reviewing the Past, Forecasting the Future


Twelve Word Tuesday: Choose Your Own IT (aka BYOD) Deservers Better Than Microsoft's Info and Graphic-free "Infographic"

2014Resolution: fewer "Infographics" and even less expecting users to secure themselves. Continue reading Twelve Word Tuesday: Choose Your Own IT (aka BYOD) Deservers Better Than Microsoft's Info and Graphic-free "Infographic"


Twelve Word Tuesday: Like Sunspots, Cybersecurity Over-Hype Follows Eleven Year Cycle

2002: Cyberterrorism 2013: NSA spying Happy Holidays! Here's to a quieter 2014 Continue reading Twelve Word Tuesday: Like Sunspots, Cybersecurity Over-Hype Follows Eleven Year Cycle


The Information Loss Costs Waaay More Than the Device Loss

SANS Newbites recently carried a news item I commented on: Two Laptops Stolen From Insurance Office Contained Unencrypted Patient Data (December 16, 2013) Earlier this month, a New Jersey health insurance company began notifying more than 800,000 members that their personally identifiable information was stored, unencrypted, on laptops stolen from Horizon Blue Cross Blue … Continue reading The Information Loss Costs Waaay More Than the Device Loss


Twelve Word Tuesday: Just Because It Is Policy Does Not Mean Security is Responsible

Monitoring/blocking unproductive use of corporate assets or connectivity shouldn't be a security function. Continue reading Twelve Word Tuesday: Just Because It Is Policy Does Not Mean Security is Responsible