Information Security Leader, Author, Instructor and Speaker

Default utility Image

How Agencies Can Secure Data from Shared Documents After Users Leave TAGS: A decade ago, agencies struggled to build collaborative workplaces because the technology to facilitate teamwork simply didn’t exist. The advent …Continue reading →

Default utility Image

How to shift from DevOps to DevSecOps TAGS: | | | The worlds of software development and IT have changed tremendously over the last two decades. Software development evolved from the …Continue reading →

Default utility Image

How to mitigate an HTTP request smuggling vulnerability TAGS: | | Load balancers play a crucial role in modern web architectures. In addition to managing the routing of traffic, they also …Continue reading →

Default utility Image

The VPN Is Obsolete. Here’s What to Do Instead. TAGS: The virtual private network has been a vital enabler of remote work for decades. But the technology, invented in 1996, …Continue reading →

Default utility Image

Stateful vs. stateless firewalls: Understanding the differences TAGS: | | When considering stateful vs. stateless firewalls, the distinction between the two approaches may sound minor but is actually quite significant. …Continue reading →

Default utility Image

Navigate the DOD’s Cybersecurity Maturity Model Certification TAGS: | | In January, the U.S. Department of Defense released the Cybersecurity Maturity Model Certification requirements, outlining new cybersecurity stipulations for DOD …Continue reading →

Default utility Image

Secure Your VPN, No Matter What TAGS: | Last year, the Department of Homeland Security issued a vulnerability notice that disturbed many in the cybersecurity community: Several popular …Continue reading →

Default utility Image

3 key identity management tips to streamline workflows TAGS: Identity management is one of the most complex activities undertaken by any IT organization. The nature of the work requires …Continue reading →

Default utility Image

How to Stop Phishing Attacks TAGS: | Most successful attacks begin with a simple message. Here is what every organization should know about eliminating email-based malware. How …Continue reading →

Default utility Image

IDC PlanScape: Privacy Engineering TAGS: “Meeting privacy expectations of management and stakeholders requires a cross-functional approach with contributions from business leaders, privacy professionals, technologists, and …Continue reading →