Prepare for Ransomware
Recently technical guidance was released for CIOs and CISOs on how to prepare for a ransomware attack. This guide was a joint effort of...
IT Governance & IT Management
Many practitioners use these terms governance and management synonymously. While there is some overlap in practice, there are key...
TU Microsoft's Cloud Compliance Manager
Microsoft newest tool allows Office 365, Dynamics 365, and Azure users track compliance and see what Microsoft has done. Cybersecurity...
The Visible Ops Handbook
This is a book review I wrote back in 2007 for a past version of this website. I am resurrecting it because it is still applicable today....
Where are the Real Vulnerabilities?
Many organizations perform regular vulnerability scans but have a hard time eliminating the vulnerabilities. Many have told me it is...
Credit Card Fraud and EMV Chips
You may have noticed that your recently issued credit cards now how a chip embedded in them. New here in the United States are Smart...
Backdoors Found in Barracuda Gear
EndFragment"Even the biggest companies can have flaws that are so simply dumb that it just might be the one move to bring the company to...
TU DDoS and IoT
On 21 OCT 2016 one of the largest scale Distributed Denial of Service (DDoS) attacks was launched against US based websites. One of the...
Maze Live 2016 Cyber-security for Local Governments
I spoke at a recent day long conference and here is the recording of that session. Session description: Is your organization doing enough...
Cyber Security for SMB
Small businesses are wide open for hacking. What can small business do to if large companies with dedicated security staff can’t stop...