What makes a cloud security program?

When creating a cloud security program the strategy should start similar to your on-premise security program.

In Amazon AWS, Infosec, Oct 20, 2019

All Stories

What makes a cloud security program?

When creating a cloud security program the strategy should start similar to your on-premise security program.

In Amazon AWS, Infosec, Oct 20, 2019

What is The Cloud DJ Blog?

I have been wanting to write a blog for a while about cloud and information security. The problem challenge was I did not want to manage another server. Having to manage code, plugins...

In Amazon AWS, Google Cloud, Microsoft Azure, Infosec, Deejay, Oct 12, 2019

When InfoSec and Diabetes Management Intersect

My daughter has childhood diabetes, which can be a frightening disease for a family to manage. If her blood glucose spikes too high or dips too low, swift action needs to be taken. ...

In Incident Response, Oct 04, 2019

Assessing the Security Posture of Software Vendors

You have much more leverage in getting a security flaw fixed before you execute the contract.

In InfoSec GRC, Feb 24, 2014

Getting Back to the Security Basics in Five Simple Steps

Here we are three quarters of the way through 2013 and the information security problems that plague organizations have a theme: the same old stuff, different day. The basics of infor...

In InfoSec, Sep 25, 2013

Salting Passwords

Chatter is up about password security due to the recent LinkedIn, Lastfm.com, and eHarmony password breaches. In these incidents, they failed to salt their password hashes or use an e...

In InfoSec, Jun 11, 2012

BYOD Issues Are with Data, Not Device

We are a society obsessed with gadgets—constantly on the lookout for the newest, shiniest gizmo that our money can buy. It is no surprise then, that the concept of BYOD (bring your ow...

In BYOD, Apr 12, 2012

Social Engineering: Are You The Weakest Link?

Even though it has been making recent headlines, social engineering is not a new phenomenon. In short, social engineering is manipulation that derives a desired action from its targe...

In Social Engineering, Nov 16, 2011

Is your organization a likely target of a Wikileaks-like attack?

The insider threat has been largely ignored and misunderstood, even by some of the top security professionals in the industry. At a security conference, a talk was being given on the ...

In Data Security, Dec 21, 2010

Securing the Application Layer

Application security has been a steadily growing focus area of enterprise information security programs. Following many security breaches, affecting small and large corporations alik...

In Application Security, Sep 03, 2010