Building an Information and IT Compliance Program TAGS: compliance In higher education, we’ve seen an unprecedented increase in laws and regulations that govern everything from the way we handle …Continue reading →
April 24, 2024
Building an Information and IT Compliance Program TAGS: compliance In higher education, we’ve seen an unprecedented increase in laws and regulations that govern everything from the way we handle …Continue reading →
Real-Life Use Cases for Vulnerability Management and Best Practices TAGS: vulnerability scanning In a presentation with my colleague Thomas Siu of Case Western Reserve University, I shared our experience with vulnerability management …Continue reading →
Stuxnet and the Advanced Persistent Threat TAGS: APT | network security | Stuxnet The Michiana chapter of the Institute of Internal Auditors invited me to give a talk today for their CPE program …Continue reading →
Webcast: Content Monitoring in the Enterprise TAGS: content monitoring | database security | DLP | DRM From data loss prevention to database activity monitoring and digital rights management, there are a bewildering variety of technologies available …Continue reading →
Podcast: Countdown: Top Five Ways to Detect Unwanted Data in the Enterprise TAGS: DLP Our file servers, workstations, flash drives and cloud services all contain massive amounts of data, driven by the fact that …Continue reading →
Presentation: Windows and Mirrors: Two Perspectives on IT Metrics TAGS: metrics I recently had the opportunity to present our work on IT Metrics at a meeting of the Common Solutions Group. …Continue reading →
Vulnerability Scanning at Notre Dame TAGS: vulnerability scanning I had the privilege of presenting Vulnerability Scanning at Notre Dame with colleagues from Qualys at EDUCAUSE 2011. Review my …Continue reading →
Podcast: Endpoint encryption strategies TAGS: encryption | endpoint security When a laptop turns up stolen, it’s reassuring to know that the contents of the device were encrypted, transforming a …Continue reading →
Podcast: Making NAC work with your existing security tools TAGS: NAC | network security This podcast provides listeners with real-world anecdotes and detailed information on how to overcome obstacles presented by conflicts between your …Continue reading →
Hacking the Vote: Information Security and the 2008 Presidential Election TAGS: elections | web security I had the opportunity to share my thoughts on the role that information security might play in the upcoming election …Continue reading →