Skip To Main Comtent

Assuming joe is required, and sturonas is required, and with Blog as Category , the following results were found.

  • How to Politely Talk Politics When it Comes to Enterprise Security

    The other day, I broke a social rule among polite company. I talked politics.
  • Top 3 HIMSS Takeaways

    I recently presented at the Healthcare Information and Management Systems Society – North Carolina Chapter – where I talked about the importance of securing data within the healthcare industry. During my time at the conference, I kept my ear to the...
  • Safe and Sound (When No One is Paying Attention)

    The worlds of fantasy and security have collided twice recently, once in practice and the other in principle.
  • What’s the Cost of Encryption in England? A Big Mac Index for Security

    After all the buzz and blimey out of London Tech Week and Interop London 2015, I was ready for a Big Mac. Typical American, right! The Big Mac I’m thinking of is more related to economics than any McDonald’s pink slime concoction.
  • The Invisible Cities of Data Security Curiosities: Report from Gartner Security and Risk Summit 2015

    Between flights from D.C. to New York to Milwaukee to London, I wanted to share a kind of wild anecdote from this week’s Gartner Security and Risk Summit.
  • The Key that Unlocks Esperanto

    As any student or traveler can attest, learning a new language is hard. How about making one up?
  • Four Disruptive Hacks to Come in 2015

    While out in Maryland to talk security with a few government contractors, I realized I was stopped at the intersection of “Snowden River Parkway” and “Broken Land Drive.” The Parkway is named for a Revolutionary War sea captain and not Edward, the...
  • First Principles of Data Security: The 4 Key Questions You Need to Be Asking

    Looking at the volume of recent data breaches, it appears that malicious hackers are becoming increasingly savvy. Maybe. But the more likely cause is that miscreants are walking through doors left open by a legacy of bad security practices – or they...
  • Cyber Wars: Every Backdoor Is an Open Door

    No one expects politicians to be experts on every subject. Elected officials and agency directors have to make decisions on dozens of complicated issues, many of which lie far outside their areas of expertise. That's why public discussion and expert...

Results 1 - 9 of 9