What Is Security?

Defining Security Is Essential To Improving It In Any Organization Security is defined in many ways within an organization; from locks on the doors, to computer passwords, to anti-virus software. Your definition of security is going to be different than mine. It is also going to be different than all of the stakeholders and employees...

What To Learn From Russian Hacking?

Few Take-Aways From The Russian Hacking Incident What Is The Lesson Learned From The Russian Hacking And For Security Program Development? There are lots of conversations about whether we should do more investigations associated with all of the attacks that are occurring constantly in our world. When looking at this from the perspective of what...

Transferable Military Skills to Cyber Security Skills

Benefits for Veterans In Cyber Security And The Transferrable Skills Many veterans leaving the service try to find a way to make their military experience transferable to the civilian sector – something that isn’t always easy. However, one terrific industry to line your skills up with is cyber security. Cyber Security takes its shape from...

Benefits for Veterans In Cyber Security

What are some benefits for Veterans in Cyber Security? After two combat deployments to Iraq with the Marines, I knew I wanted to leave the military when my contract was done. Like so many other veterans transitioning out of the service, I wasn’t exactly sure where I belonged in the civilian sector. I had a...

3 Ways Organizations Will Act In 2017 On Their Security Programs

Option 1: Organizations will try to defend themselves with the help of a diet pill strategy. In the year 2017, organizations will be seen taking many shortcuts in the pursuit to do something with their security systems. Many don’t know, but security program development process takes a bit time and is basically process based. The...

2017: The Year to Develop Efficient Security Programs

2017: Year to Build A Repeatable System For Information Security Program Management It was just in the year 2004 that we had released the CISCO Handbook. The book described the step-by-step methodology for building effective information security program. When it released, we thought our team would create an information security consultancy to spread the word...

How should you protect your online accounts?

Why is it Important to Use Complex Passwords Across Multiple Websites and Applications? The majority of companies and websites have been breached. The most recent being Yahoo where over 1 billion accounts were compromised. These attacks result in accounts, and often passwords, being sold on the black market for reuse by criminals. If you use...

Yahoo Breach: How does it effect you?

  Yahoo Breach: Why it Effects All Websites with User Accounts The Yahoo breach, will, of course, impact all the users in which accounts were stolen, but it also has a larger impact on other website or application operators where Yahoo users are also members. In many cases, people use their Yahoo email address as...

Security Remediation Planning | Tips and Considerations for Planning Activities [VIDEO]

Security Remediation Planning: Tips for Non-Security Executives “People are spending a lot of money right now on remediation planning, but they are surprised that they are not getting the results they expected.” -Mike Gentile As we enter, 2017 many organizations are currently planning how to fix significant amounts of security issues within their organizations. These...

Security Program Elements | Is your Information Security Program a Flip or Flop?

Elements of a Healthy Security Program Many companies are trying to implement Cyber Security Programs for their organization. An interesting security program element is there is no correlation between spending a lot of money on security technologies, using a well-known consultancy to build a set of security policies for your organization or any of the...