Is there true accountability for technology investments? Consider past investments for InfoSec as another possible cause for waning support. Over the past 5 years, the InfoSec industry has been flush with security technology spending driven a crowded product marketplace. While most technologies are built on sound principles for reducing risk, they require process definition and...Read More
As a consulting firm that works with Information Security (InfoSec) leaders at a variety of organizations, there is a disturbing trend that has evolved in the past year. Many of them are looking for new jobs (at other companies) or considering leaving the profession altogether. In a field that is already short on good talent…why...Read More
The old saying is something like this: Passwords are like underwear. You should change them often, you shouldn’t share them and they should be mysterious. In other words, your password should be a total mystery to everyone else. With more and more of your daily activities being transitioned to the internet, your password is just...Read More
Use Secure Connections/VPN When offered a choice between connecting to an unsecured network vs. a secured network, always choose the latter. The ease of connecting to an unsecured network is enticing at times, but logging in with credentials always pays off. If no secured network is available, use a Virtual Private Network, or VPN, to...Read More