Kevin
-
Recent Posts
- “Harmonizing the Digital Symphony: The Essential Role of Cybersecurity Detection Engineers in Safeguarding Cyber Landscapes”
- Cybersecurity Deception Engineers: The Unseen Guardians of Cybersecurity Programs and the Unsung Heroes in the Battle Against Cyber Threats
- Offense for Defense: The Art and Science of Cybersecurity Red Teaming
- DEFENSE IS THE BEST OFFENSE: THE EVOLVING ROLE OF CYBERSECURITY BLUE TEAMS AND THE IMPACT OF SOAR TECHNOLOGIES
- SECURING CORPORATE IoT DEVICES: CHALLENGES, STRATEGIES, AND THE ROLE OF AI AND ML IN CYBERSECURITY
Archives
-
Daily Archives: October 21, 2012
Building the Information Assurance Program
In 1948 in his book “The Seven Story Mountain”, Thomas Merton wrote “Success – the logic of worldly success rests on a fallacy: the strange error that our perfection depends on the thought and opinions and applause of other men.” … Continue reading
Non-Expiring Passwords for C Level Employees. Really?
So, the other day while teaching my Online Course in Computer Security for the University of Advancing technologies I had a student ask me what they should do if their CFO asked to have an unexpiring password in a publicly … Continue reading
My own webpage, who would have ever thought it? I know back in the 8th grade when they gave us some sort of “here’s what you have the ability to be in your life” test and mine came back that … Continue reading