Security Approach – what matters

It is always with amusement that I receive offers of “free reviews” or “free assessment” when it comes to security. Invariably the company performing the assessment identifies a fatal flaw in the current architecture and does the Dick Cheney VP selection approach: they magically have the exact solution for the problem they identified and they […]

Cyber Security in the Wild

For something that was unheard of when Internet started (though viruses were there all along) to now having completely separate departments from IT with a C-level suite leader, this is quite a transformation in 25 years. There is a myriad of tools / techniques/ methodologies/ standards coupled with a larger myriad of vendors accomplishing from […]