Shadow IT: The hidden danger
Shadow IT, a term that just sounds insidious. Surely it is something that governments use as a tool for state-sponsored cyber wars, right? The term suggests hidden technologies, lurking in the background. …
Read MoreSecurity For All
Shadow IT, a term that just sounds insidious. Surely it is something that governments use as a tool for state-sponsored cyber wars, right? The term suggests hidden technologies, lurking in the background. …
Read More(Post 12 of the 12-week Information Security Management blog series) Information security is unlike other information technology disciplines. Most others require the professional to be proficient and knowledgeable in their area of …
Read More(Post 11 of the 12-week Information Security Management blog series) Much like our skin is a protective barrier for our bodies, leaders shield their organizations from threats. The risk-based decisions that leaders make directly …
Read More(Post 10 of the 12-week Information Security Management blog series) You would have to be hiding under a rock for the past several years if you haven’t noticed the increased media …
Read More(Post 9 of the 12-week Information Security Management blog series) Choosing the appropriate risk management approach is a critical step in addressing and dealing with risk. If you have been following along, …
Read More(Post 8 of the 12-week Information Security Management blog series) Starting and managing a cybersecurity program can seem incredibly confusing and even overwhelming. Wading through several hundred pages of guidance and standards can …
Read More(Post 7 of the 12-week Information Security Management blog series) Thinking of information security as a single project can result in an ineffective security program that fails to properly address both …
Read More(Post 6 of the 12-week Information Security Management blog series) So far in this series, I have written about risk, trending threats to small business, and how employing cybersecurity can be beneficial …
Read More(Post 5 of the 12-week Information Security Management blog series) If your organization conducts business within a few industries, there are federal laws and regulations that require the protection of sensitive …
Read More(Post 4 of the 12-week Information Security Management blog series) If you are following along, last week I wrote about threats, risks, and vulnerabilities. I discussed the importance of identifying threats …
Read More