IT Governance & IT Management
Many practitioners use these terms governance and management synonymously. While there is some overlap in practice, there are key...
The Visible Ops Handbook
This is a book review I wrote back in 2007 for a past version of this website. I am resurrecting it because it is still applicable today....
Where are the Real Vulnerabilities?
Many organizations perform regular vulnerability scans but have a hard time eliminating the vulnerabilities. Many have told me it is...
Threat Modeling
Application Security is vital, it is not enough to implement firewalls and anti-virus. Applications need to be protected and one of the...