Web Application Security
When I ask people what steps they have taken to secure their infrastructure, I get the usual answers. "We…
Read MoreProtecting your Digital Assets: A Discussion on the Need for a Data Security and Data Loss Prevention Strategy
We are pleased to have a guest writer for this month's edition of Security Notes. Written by George Schaefer,…
Read MoreSecurity really isn't Sexy? When It's Done Correctly
I must admit, in my initial conversations with Jerry about the business of True (at the time DESA) and…
Read MoreThreat Sources? Hard Questions about Focusing Your Network Protection
The Verizon Business RISK Team released a very interesting study early in June. The study contained detailed…
Read MoreKids and the Internet
I know better than to cross the street without looking both ways or to touch a hot stove top, but these…
Read MoreI Make Mistakes
Now for a moment of transparency from your friendly information security professional: I make mistakes.…
Read MoreCubicle Fruit
In the last Security Notes, we covered the first of the "3 P's," of information security: perimeter.…
Read MoreWhat gets through your firewall?
(Or: How burned is your network?) One of my colleagues noted in an earlier article that there is a common…
Read More3 P's of Information Security: Perimeter
In my last article I briefly discussed the three key components, or the "3 P's," of information security,…
Read MoreThe Importance of an Incident Response Plan
Most organizations are going to experience a computer security incident each year. Those organizations…
Read More