Cyber Skills Training at SANS Rocky Mountain Fall 2017. Save $400 thru Aug. 2.

SANS Security Trend Line

Ramblings on Risk Part I

I recently gave a webinar talk on Security Analytics that included a simplified risk equation I've been showing for years: Risk = (Threat * Vulnerability) + Action I'll explain that more in a bit. After the webinar I got some Twitter feedback that it was better to stick with the more historical risk equation: Risk … Continue reading Ramblings on Risk Part I


Twelve Word Tuesday: Look for the Fair Trade Label on Your Next Cup of Software

Fair-trade coffee buying assures sustainable farming - where's fair-trade software for secure development? Continue reading Twelve Word Tuesday: Look for the Fair Trade Label on Your Next Cup of Software


Twelve Word Tuesday: If Your Name is Target, You Probably Should Realize You Are One

Brick and mortar retailers have way more data breach incidents than e-tailers. Continue reading Twelve Word Tuesday: If Your Name is Target, You Probably Should Realize You Are One


The January Trend Ritual: Reviewing the Past, Forecasting the Future

"I have seen the future and it is very much like the present, only longer." -Kehlog Albran, The Profit Since I use the word Trends in this blog title, I'm legally obligated to review my past predictions and make new ones for 2014. So, here's Part I, a look back at the trends I predicted … Continue reading The January Trend Ritual: Reviewing the Past, Forecasting the Future


Twelve Word Tuesday: Choose Your Own IT (aka BYOD) Deservers Better Than Microsoft's Info and Graphic-free "Infographic"

2014Resolution: fewer "Infographics" and even less expecting users to secure themselves. Continue reading Twelve Word Tuesday: Choose Your Own IT (aka BYOD) Deservers Better Than Microsoft's Info and Graphic-free "Infographic"