Search Results

Is Defense-in-Depth a Myth?
Defense-in-depth teaches us that information security is best implemented using layers of defense.
Executive_Blog/Defense-in-Depth-a-Myth.aspx
Changes to the CISSP Exam
In 2014 interactive hotspot and drag and drop questions were added to the CISSP exam.
Executive_Blog/CISSP-Exam-Changes.aspx
Soft and Chewy on the Inside Makes the Perimeter Irrelevant
A CISO liked to describe her enterprise as "hard and crunchy on the outside, soft and chewy on the inside"
Executive_Blog/Soft-and-Chewy-on-the-Inside.aspx
Information Technology Infrastructure Library (ITIL) and Six Sigma
Security products and processes must be integrated into the business side of a company effectively.
Executive_Blog/Information-Technology-Infrastructure-Library-ITIL-Six-Sigma.aspx
Don’t Touch that USB Drive – You Don’t Know Where It’s Been!
An associate was the controller of an east coast defense contractor. She told me us story about a security breach they had – it’s an interesting story because we’ve heard many variations of this same breach through the years.
Executive_Blog/Dont-Touch-that-USB-Drive-You-Dont-Know-Where-Its-Been.aspx
Common Cybersecurity Practices That Produce Unexpected Results
I read a recent article from the Harvard Business Review that listed the most common cybersecurity safeguards that are less effective against insiders than against outsiders.
Executive_Blog/Common-Cybersecurity-Practices-That-Produce-Unexpected-Results.aspx


Some Of Our Many Satisfied Customers:


Representative sample of security clients for Human Element