Information Security Leader, Author, Instructor and Speaker

Default utility Image

Mobile Device Management TAGS: Walking the corridors of any organization these days reveals heads buried in all manner of smartphones and tablet PCs.  Whether …Continue reading →

Default utility Image

Two Factor Authentication Over the past decade, government agencies have seen greatly increased demand to share information with each other at the federal, …Continue reading →

Default utility Image

White Paper: Risk Assessment and Data Loss Prevention TAGS: | Cloud computing, virtualization, social networking, mobility, peer-to-peer computing: Although these terms spark innovative ideas in many parts of an organization, …Continue reading →