Information Security Leader, Author, Instructor and Speaker

Default utility Image

Closing the Cybersecurity Generation Gap TAGS: | | | Businesses around the world find their workforces increasingly divided along generational lines.  As the Boomer generation nears retirement, they find …Continue reading →

Default utility Image

Exploring PCI DSS Requirement 2 Compliance Issues TAGS: | | Readers of the 2014 Verizon PCI DSS compliance report may be surprised to learn that 48.9% of companies failed to …Continue reading →

Default utility Image

Product Review: Configuresoft’s Enterprise Configuration Manager 4.9 TAGS: | Since we last looked at Enterprise Configuration Manager (ECM) about three years ago, Configuresoft has improved its value to enterprises …Continue reading →

Default utility Image

Configuration Management: Configuresoft’s Enterprise Configuration Manager v4.7 TAGS: | Configuresoft’s Enterprise Configuration Manager (ECM) v4.5 and were impressed with the system’s ability to aggregate Windows system configuration information, remediate …Continue reading →