Yes, we know that information security in an interconnected world is not trivial. We accept that configuration errors or malicious insiders or new, complex threats might conspire to provide opportunities for a breach. But who says that it is acceptable...
As I think about it, the title is probably misleading, because being a Technology Manager with change-agent responsibility is not the same as being a Technology Change Agent. In my particular case, I’m not looking to change the technology, necessarily. In...
Given the recent spate of breach announcements from companies like Monster.com and TradeFreedom Securities Inc., I’ve been thinking about how poor security is going to impact organizations and consumers over the next few years. Even though there have been an...
Does fulfilling your regulatory compliance requirements actually lead you to be more secure? Will your organization automatically attain compliance by pursuing a strict regimen of security practices? In short, is the quest to be compliant complementary,...
These days, you can find a whole lot of discourse in both technology and business periodicals, on the need for technologists to be able to interface with the business, and not just operate a stereotypical geeks in a backroom or basement somewhere. In many ways,...