Information Security Leader, Author, Instructor and Speaker

Default utility Image

5 Steps to Integrate a Business’ Security Solutions TAGS: Your organization probably has a diverse set of security tools working to help reduce your risk profile and combat active …Continue reading →

Default utility Image

IDC PlanScape: Building a Security Operations Center TAGS: | | “The security operations center serves as the nerve center of an organization’s cybersecurity program,” says Mike Chapple, adjunct analyst with …Continue reading →

Default utility Image

Email Security: Defending the Enterprise TAGS: | | Entities seeking to secure their email environments should establish a comprehensive strategy designed to protect both the email infrastructure and …Continue reading →

Default utility Image

Managed Security Services in the Enterprise TAGS: | | | | Enterprises across a wide variety of industries are turning to cloud computing to reduce the burden on their IT support …Continue reading →