Search Results

Is Defense-in-Depth a Myth?
Defense-in-depth teaches us that information security is best implemented using layers of defense.
Changes to the CISSP Exam
In 2014 interactive hotspot and drag and drop questions were added to the CISSP exam.
Soft and Chewy on the Inside Makes the Perimeter Irrelevant
A CISO liked to describe her enterprise as "hard and crunchy on the outside, soft and chewy on the inside"
Information Technology Infrastructure Library (ITIL) and Six Sigma
Security products and processes must be integrated into the business side of a company effectively.
Don’t Touch that USB Drive – You Don’t Know Where It’s Been!
An associate was the controller of an east coast defense contractor. She told me us story about a security breach they had – it’s an interesting story because we’ve heard many variations of this same breach through the years.
Common Cybersecurity Practices That Produce Unexpected Results
I read a recent article from the Harvard Business Review that listed the most common cybersecurity safeguards that are less effective against insiders than against outsiders.

Some Of Our Many Satisfied Customers:

Representative sample of security clients for Human Element