Project management in cybersecurity
(Post 7 of the 12-week Information Security Management blog series) Thinking of information security as a single project can result in an ineffective security program that fails to properly address both …
Security For All
(Post 7 of the 12-week Information Security Management blog series) Thinking of information security as a single project can result in an ineffective security program that fails to properly address both …
(Post 6 of the 12-week Information Security Management blog series) So far in this series, I have written about risk, trending threats to small business, and how employing cybersecurity can be beneficial …
(Post 5 of the 12-week Information Security Management blog series) If your organization conducts business within a few industries, there are federal laws and regulations that require the protection of sensitive …
(Post 4 of the 12-week Information Security Management blog series) If you are following along, last week I wrote about threats, risks, and vulnerabilities. I discussed the importance of identifying threats …
(Post 3 of the 12-week Information Security Management blog series) Vulnerabilities, threats, and risk are three critical terms to understand in order to properly protect one’s information. These are terms …
(Post 2 of the 12-week Information Security Management blog series) When I ask people what they think is involved in cybersecurity, I almost unanimously receive a reply stating that its purpose …
(Post 1 of the 12-week Information Security Management blog series) When I started Concerned Nerds it was because I had the realization that the cybersecurity industry often times seems to overlook …
What do you think when you hear the terms “hacker” or “hacking”? Do you imagine a socially awkward, super smart nerd sitting in his basement using an incredible wealth of …
To small businesses, the threat of cyber-crime may seem like something only governments and big corporations need to be concerned with. To the contrary, small businesses are also vulnerable to …
For some, the word ‘cyber’ might conjure a sense of extreme geekiness and memories of cheesy movies involving unrealistic representations of computer crime, computer intelligence gathering, or secret societies using …