There’s a saying in project management that been attributed to Jack Bergman, “there’s never enough time to do it right the first time, but there’s time to dot it over.” Sadly, many leaders and organizations appear to operate by this maxim. According to a report by...
A few weeks ago, I read an article that provided significant insight into the Spy vs Spy battles between the Unites States and Russia. Title: Russia carried out a ‘stunning’ breach of FBI communications system, escalating the spy game on U.S. soil It was...
Ransomware is skyrocketing – but we really shouldn’t be surprised. In fact, many in the cybersecurity community saw it coming. To set the tone for what I’m talking about, here are just a few of the recent headlines pertaining to ransomware: ...
This past week I read a pretty interesting article, posted on SiliconANGLE, about vulnerabilities found in cloud applications. It had the unfortunate title of: Report finds 34M vulnerabilities across AWS, Google Cloud and Azure This was compounded by the lead off...
Join me on a webinar about managing secrets such as passwords, encryption keys, API keys, etc. July 17, 2019 – Keeping Secrets, Secret! How to Manage Highly Sensitive Data to Protect Your Organization...
If your bank supports it, you would do well to consider Virtual Credit Card numbers for online purchases. I was looking around for some good articles that discussed potential pitfalls or problems and found this gem of an article. Suffice it to say, that the best part...