Security
April 19, 2019

Sensitive Data Security: It’s All…

Well, in today’s post it is all about the logging.  In a future post it will be all about the alerting. …

Read More
Security
April 12, 2019

ERP Data Security Assessments: Then…

This is a long one and gets techie in areas, but bear with me.  There’s a moral to the story. As regular readers…

Read More
Security
March 18, 2019

How Establishing Strong Segregation of…

In the years I’ve been architecting and assessing organizational information security approaches; the typical focus of…

Read More
Security
March 7, 2019

Making Sense of MFA, SSO…

I was at the Alliance conference in Orlando this past week, and in the course of presenting and listening to multiple…

Read More
Security
February 25, 2019

Privacy Versus Security in a…

There’s an interesting story from a few years ago.  An angry father marched into the corporate office of Target and…

Read More
Security
February 18, 2019

Data Privacy and the Evolution…

In my years of performing organizational security assessments, application level vulnerability testing usually included…

Read More
Security
February 5, 2019

CISO Survival 103: The Importance…

This will be the final entry in our current CISO Survival series.  And we’re taking a step back.  We’ve talked about…

Read More
Security
February 1, 2019

CISO Survival Part 2: The…

In our previous post, we talked about the role of the CISO and how the rapidly evolving, connected economy is creating…

Read More
Security
January 30, 2019

CISO Survival: Are You Protecting…

Do You Even Know What and Where It Is? Not too long ago, I was involved in the war room activities surrounding the…

Read More