3 Days Left to Save $200 on SANS Scottsdale 2017

SANS Security Trend Line

Twelve Word Tuesday: A Different Brexit - Breach/Brazil Exit Precautions Are in Order

Treat executive travel to the Olympics like China trips - provide clean/burner devices. Continue reading Twelve Word Tuesday: A Different Brexit - Breach/Brazil Exit Precautions Are in Order


Twelve Word Tuesday: Intel/McAfee Proves Once Again That Infrastructure Can Not/Will Not Protect Itself

Cloud is infrastructure like CPUs, Windows/Linux, even users - always need external protection. Intel exploring selling what is left of McAfee. Continue reading Twelve Word Tuesday: Intel/McAfee Proves Once Again That Infrastructure Can Not/Will Not Protect Itself


Twelve Word Tuesday: Don't Be the "Dog That Caught the Car" When Board-Briefing Opportunity Arises

Having something board-worthy to say: Are you collecting business relevant security metrics? Free SANS CISO Hot Topic Session with CISCO CISO Steve Martino, SANS Founder Alan Paller and SANS Director John Pescatore Tuesday 14 June: "Communicating to and Influencing CEOs and Boards of Directors: What Works and What to Avoid" Continue reading Twelve Word Tuesday: Don't Be the "Dog That Caught the Car" When Board-Briefing Opportunity Arises


Twelve Word Tuesday: Why Are US Elected Officials Resorting to "Bring Your Own Security" for Basic Security Hygiene??

. Fifteen year's Federal PKI spending - Congresspersons must look for BYO encryption apps? . Reps. Will Hurd (R-Texas) and Ted Lieu (D-Calif.) "Dear Colleague" letter to the entire House of Representatives on basic security hygiene. Continue reading Twelve Word Tuesday: Why Are US Elected Officials Resorting to "Bring Your Own Security" for Basic Security Hygiene??


Progress in Using the Critical Security Controls to Sort Out "Security Bad Apples"

In the past six months or so, there has been a lot of forward movement in state and federal government around the idea of screening suppliers and contractors for "basic security hygiene" as embodied in the Critical Security Controls. Most importantly, new federal procurement regulations will go into effect June 15th that directly require contractors … Continue reading Progress in Using the Critical Security Controls to Sort Out "Security Bad Apples"