What makes a cloud security program?
When creating a cloud security program the strategy should start similar to your on-premise security program.
What is The Cloud DJ Blog?
In Amazon AWS, Google Cloud, Microsoft Azure, Infosec, Deejay, Oct 12, 2019When InfoSec and Diabetes Management Intersect
In Incident Response, Oct 04, 2019Assessing the Security Posture of Software Vendors
In InfoSec GRC, Feb 24, 2014All Stories
What makes a cloud security program?
When creating a cloud security program the strategy should start similar to your on-premise security program.
In Amazon AWS, Infosec, Oct 20, 2019What is The Cloud DJ Blog?
I have been wanting to write a blog for a while about cloud and information security. The problem challenge was I did not want to manage another server. Having to manage code, plugins...
In Amazon AWS, Google Cloud, Microsoft Azure, Infosec, Deejay, Oct 12, 2019When InfoSec and Diabetes Management Intersect
My daughter has childhood diabetes, which can be a frightening disease for a family to manage. If her blood glucose spikes too high or dips too low, swift action needs to be taken. ...
In Incident Response, Oct 04, 2019Assessing the Security Posture of Software Vendors
You have much more leverage in getting a security flaw fixed before you execute the contract.
In InfoSec GRC, Feb 24, 2014Getting Back to the Security Basics in Five Simple Steps
Here we are three quarters of the way through 2013 and the information security problems that plague organizations have a theme: the same old stuff, different day. The basics of infor...
In InfoSec, Sep 25, 2013Salting Passwords
Chatter is up about password security due to the recent LinkedIn, Lastfm.com, and eHarmony password breaches. In these incidents, they failed to salt their password hashes or use an e...
In InfoSec, Jun 11, 2012BYOD Issues Are with Data, Not Device
We are a society obsessed with gadgets—constantly on the lookout for the newest, shiniest gizmo that our money can buy. It is no surprise then, that the concept of BYOD (bring your ow...
In BYOD, Apr 12, 2012Social Engineering: Are You The Weakest Link?
Even though it has been making recent headlines, social engineering is not a new phenomenon. In short, social engineering is manipulation that derives a desired action from its targe...
In Social Engineering, Nov 16, 2011Is your organization a likely target of a Wikileaks-like attack?
The insider threat has been largely ignored and misunderstood, even by some of the top security professionals in the industry. At a security conference, a talk was being given on the ...
In Data Security, Dec 21, 2010Securing the Application Layer
Application security has been a steadily growing focus area of enterprise information security programs. Following many security breaches, affecting small and large corporations alik...
In Application Security, Sep 03, 2010