Security Project Management – Benefits of Experience
Over the course of the last several years, I have been involved in the planning, development, implementation and assessment of cyber security strategies both internally and externally. During one...
View ArticleWhat I have learned in my first year of Cyber Security: Part One
You know that saying everyone uses “drinking water from a fire hose?” Cyber Security is nothing like that! Before I joined VioPoint, I saw commercials on TV, where everyone is sitting in a huge SOC and...
View ArticleCyber Payment Fraud: A Layered Security Approach
When it comes to preventing cyber payment fraud, traditional security controls are proving to be insufficient. Cyber criminals are becoming more sophisticated. Three decades ago, paper check fraud...
View ArticleRansomware: Prevention Now Will Save Panic Later
Your organization has just made a startling discovery. They have been the victim of a ransomware attack and are now facing the challenge of what to do about it. Moreover, you discover that your...
View ArticleIs Your Vulnerability Management Process Effective?
If your current vulnerability management process providing the value that is meaningful to your business? A well implemented and effectively managed vulnerability management process can deliver...
View ArticleCompanies Struggling with Network Security Monitoring
Earlier this year a report released by the Ponemon Institute indicated that four out of five businesses lack the required infrastructure and/or security resources with the proper skills required to...
View ArticleHelp Desk Coordinator versus Networking Monitoring
Transitioning from one job to another can be a nerve wracking experience, especially when combined with an introduction into unfamiliar territory. I had been working in IT for about five years. I’d...
View ArticleDefense in Depth Isn’t Dead You’re Just Doing it Wrong
Over the last six months or so I’ve a read a few articles concerning the demise of defense in depth. I’ve also conversed with a few of my peers at organizations where management seems to be forgoing...
View ArticleWhat I have learned in my first year of Cyber Security: Part Two- Projects &...
I hope everyone that had a chance to read my part one blog enjoyed it and gained a little extra knowledge. As I mentioned, part two is going to be focused on the difference between projects and...
View ArticleWhat Has The Internet Done?
I recently read an article, which got me thinking about security (which naturally, is always the first thing that comes to mind). Mashable.com recently wrote an article, ‘Bleak’ – study finds young...
View Article
More Pages to Explore .....