Twenty Critical Security Controls for Effective Cyber Defense: Consensus...
The Twenty Critical Security Controls have already begun to transform security in government agencies and other large enterprises by focusing their spending on the key controls that block known attacks...
View ArticleHOW DID SNOWDEN (REALLY) DO IT?
I recently stumbled across an article in Dark Reading entitled “How Did Snowden Do It?” The piece does a great job pointing out how failures in authentication allowed Snowden to gain access to...
View ArticleWERE LAW FIRMS THE FIRST TO DISCOVER THE POWER (AND PITFALLS) OF METADATA?
Thanks to the NSA leaks, metadata has become a mainstream topic of conversation. Many of the less technically inclined are trying to make sense of it all. TV is not necessarily my go-to educational...
View Article
More Pages to Explore .....