Information Security Leader, Author, Instructor and Speaker

Default utility Image

Why You Should Conduct Risk Assessments Before Buying New Cybersecurity Products TAGS: The worldwide market for cybersecurity products and services will surpass $95 billion this year, according to Gartner. That’s a staggering …Continue reading →

Default utility Image

What Security Vulnerabilities Should Be Fixed First? TAGS: | | Enterprises who begin a vulnerability management program often find themselves quickly faced with an intimidating avalanche of data. Scan results …Continue reading →

Default utility Image

PCI DSS Risk Assessments TAGS: | | The Payment Card Industry Security Standards Council (PCI SSC) recently released additional advice for merchants seeking to comply with the …Continue reading →

Default utility Image

Quantitative Risk Assessment TAGS: “So, are you ready to make this investment in the security of your data?”  As the salesperson pushes a proposal …Continue reading →

Default utility Image

White Paper: Risk Assessment and Data Loss Prevention TAGS: | Cloud computing, virtualization, social networking, mobility, peer-to-peer computing: Although these terms spark innovative ideas in many parts of an organization, …Continue reading →