Information Security Leader, Author, Instructor and Speaker

Default utility Image

Find Your Footing in Cloud Security with CCSK The cloud is here to stay. Organizations of all sizes and industries are turning to cloud services as a flexible, …Continue reading →

Default utility Image

Solving the cybersecurity staffing shortage Cybersecurity is at a critical juncture. Organizations around the world increasingly recognize the importance of cybersecurity to their reputation and …Continue reading →

Default utility Image

Keep Your Campus Both Smart and Secure as IoT Expands The Internet of Things is taking college campuses by storm. From a Google Home in a professor’s office to a …Continue reading →

Default utility Image

4 Ways to Use Context-Aware Security for Maximum Advantage Professionals at higher education institutions make context-aware security decisions every day. A security guard decides which visitors to allow on …Continue reading →

Default utility Image

Half-a-billion reasons not to use free e-mail On September 26, 2016, Yahoo! announced to the world that they were the victim of the largest systematic account compromise in …Continue reading →

Default utility Image

3 Tips for Feds Looking to Ditch Old Datasets The digital universe is expanding at a staggering rate as government agencies, businesses and citizens generate troves of data each …Continue reading →

Default utility Image

Still got it: CISSP certification a must for aspiring security professionals Rumors of the Certified Information Systems Security Professional (CISSP) certification’s demise are greatly exaggerated. In January 2015, I published an …Continue reading →

Default utility Image

Managed security providers: What’s new? The managed security service provider market has grown recently, with providers adding both new customers and new services designed to …Continue reading →

Default utility Image

Connect to the red-hot hiring realm of network security with these top certs New network security threats arise on almost a daily basis, as users explore new ways of working and hackers develop …Continue reading →

Default utility Image

The science (and certification) of writing secure code The world runs on code. From online banking to electronic voting systems and from self-driving cars to medical devices, almost …Continue reading →