Articles / Monthly Archive for November 2016

Few technology disciplines have seen as much career management change as cyber security. Born as a sleepy technical focus in the 1980’s, the closest an early security professional would come to the C-Suite would be if some senior manager lost a badge. Since then, however, the profession has begun ...read more

on 29 Nov 2016

November 25, 2016 D.J. Trump President-Elect of the United States Sir: Having faithfully served our nation for three decades as a cyber security leader in business, academia, and government, I believe it is my duty to offer advice on how your new Administration should address our accelerating national cyber risk. I hope ...read more

on 25 Nov 2016

The traditional IT model has been often maligned for its lack of flexibility in dealing with the myriad of changes required for enterprise workflow, office applications, and corporate databases. By offering IT Infrastructure as a utility service at layers 4 and below, the advantages of metered, on-demand usage ...read more

on 22 Nov 2016

The earliest log management tools were designed to reduce the burden of sifting through reams of audit trails in support of compliance and other business objectives. Such work was typically done with mainframes, and it was a big deal if anything of real security consequence was actually detected. ...read more

on 21 Nov 2016

Every cyber security expert agrees that the most insidious attacks today start with some sort of email-based probe. Links to infected sites, social engineering to extract money, or payloads carrying malware slip through gauntlets to the target user’s PC. When the user clicks innocently, this leads to a series of ...read more

on 18 Nov 2016

Take a moment and visualize an octopus with its long slimy limbs protruding out from its large round ugly head. In your mind, gently place the octopus head down onto C Street in Foggy Bottom. And then carefully stretch the various limbs across the entire world to each ...read more

on 06 Nov 2016