Healthcare Principles and IT Security
Applying the principles of healthcare to IT security is really a good analogy in the sense that the problems and solutions (or lack thereof) have similarities. The IT patient is really the “living”...
View ArticleAttack Lifecycle Modeling
Every form of traditional warfare has used a bag of age-old tactics and strategies. The defender builds watchtowers, deeper moats, and higher walls to observe and block the intruders and protect the...
View ArticleWhy Security Needs to Handle Change-Ups
In baseball, the change-up is a pitch that arrives much slower to the plate. The reduced speed coupled with a deceptive delivery style is intended to confuse the batter's timing. In similar style,...
View ArticleThreat Vectors
The old fashioned threat vectors were merely scratching at the surface. Emerging advanced malware is poised for Attack-In-Depth exploiting users, processes and systems alike, requiring a measured...
View ArticleTHE EPICENTER OF CLOUD COMPUTING
Trust is at the epicenter of Cloud Computing and the single most powerful enabler for cloud migration, and probably even more compelling than promises of savings in CapEx and OpEx. Moving data to the...
View Article
More Pages to Explore .....