Part 4: Define, Assess and Prioritize Your Security Architecture “And a step backward, after making a wrong turn, is a step in the right direction.” ― Kurt Vonnegut, Player Piano Before we commence our discussion on security architecture as part of our security evolution, I’d like to share a recent relevant experience. While scoping ...
Part 3: What to Expect in a Security Assessment Hi again fellow cyber-security concerned business people! In my last security post (Five Areas for Complete Coverage), I promised to begin our cyber security journey with a “security assessment”. First, make sure you go into that security assessment in the right frame of mind. Focus on ...
Part 2: Five Areas for Complete Internet Security Coverage Hello again cyber security-concerned business people… Last post I wrote about the somewhat confusing landscape of cyber security. Let’s continue on that theme with an eye to removing some of the confusion. “One step at a time” is the required approach — this isn’t exactly rocket ...
Part 1: The Landscape of Internet Security in 2018 It seems that each new day brings startling new statements, broadcast loudly from internet security vendors. Statements like “It’s not a matter of if but when”, or “60% of websites are infected”, or “40% of ransomware victims declare bankruptcy”, or “The average discovery of infections in ...
Yes, voice and data convergence was introduced back in the 80’s. ISDN (“Integrated Services Digital Network”, but some of its more unflattering nicknames included “It Still Does Nothing” or “I See Dollars Now “) was a common variant touted by most major telecom companies. But here we are 25 years later and we still have a ...