Categories
Application Security
Securing the Application Layer
Application security has been a steadily growing focus area of enterprise information security programs. Following many security breaches, affecting small and large corporations alik...
In Application Security, Sep 03, 2010Data Security
Is your organization a likely target of a Wikileaks-like attack?
The insider threat has been largely ignored and misunderstood, even by some of the top security professionals in the industry. At a security conference, a talk was being given on the ...
In Data Security, Dec 21, 2010Social Engineering
Social Engineering: Are You The Weakest Link?
Even though it has been making recent headlines, social engineering is not a new phenomenon. In short, social engineering is manipulation that derives a desired action from its targe...
In Social Engineering, Nov 16, 2011BYOD
BYOD Issues Are with Data, Not Device
We are a society obsessed with gadgets—constantly on the lookout for the newest, shiniest gizmo that our money can buy. It is no surprise then, that the concept of BYOD (bring your ow...
In BYOD, Apr 12, 2012InfoSec
Getting Back to the Security Basics in Five Simple Steps
Here we are three quarters of the way through 2013 and the information security problems that plague organizations have a theme: the same old stuff, different day. The basics of infor...
In InfoSec, Sep 25, 2013Salting Passwords
Chatter is up about password security due to the recent LinkedIn, Lastfm.com, and eHarmony password breaches. In these incidents, they failed to salt their password hashes or use an e...
In InfoSec, Jun 11, 2012InfoSec GRC
Assessing the Security Posture of Software Vendors
You have much more leverage in getting a security flaw fixed before you execute the contract.
In InfoSec GRC, Feb 24, 2014Incident Response
When InfoSec and Diabetes Management Intersect
My daughter has childhood diabetes, which can be a frightening disease for a family to manage. If her blood glucose spikes too high or dips too low, swift action needs to be taken. ...
In Incident Response, Oct 04, 2019Amazon AWS
What makes a cloud security program?
When creating a cloud security program the strategy should start similar to your on-premise security program.
In Amazon AWS, Infosec, Oct 20, 2019What is The Cloud DJ Blog?
I have been wanting to write a blog for a while about cloud and information security. The problem challenge was I did not want to manage another server. Having to manage code, plugins...
In Amazon AWS, Google Cloud, Microsoft Azure, Infosec, Deejay, Oct 12, 2019Google Cloud
What is The Cloud DJ Blog?
I have been wanting to write a blog for a while about cloud and information security. The problem challenge was I did not want to manage another server. Having to manage code, plugins...
In Amazon AWS, Google Cloud, Microsoft Azure, Infosec, Deejay, Oct 12, 2019Microsoft Azure
What is The Cloud DJ Blog?
I have been wanting to write a blog for a while about cloud and information security. The problem challenge was I did not want to manage another server. Having to manage code, plugins...
In Amazon AWS, Google Cloud, Microsoft Azure, Infosec, Deejay, Oct 12, 2019Infosec
What makes a cloud security program?
When creating a cloud security program the strategy should start similar to your on-premise security program.
In Amazon AWS, Infosec, Oct 20, 2019What is The Cloud DJ Blog?
I have been wanting to write a blog for a while about cloud and information security. The problem challenge was I did not want to manage another server. Having to manage code, plugins...
In Amazon AWS, Google Cloud, Microsoft Azure, Infosec, Deejay, Oct 12, 2019Deejay
What is The Cloud DJ Blog?
I have been wanting to write a blog for a while about cloud and information security. The problem challenge was I did not want to manage another server. Having to manage code, plugins...
In Amazon AWS, Google Cloud, Microsoft Azure, Infosec, Deejay, Oct 12, 2019