May 6, 2012    /    by

Listening to the Noobs on Security - Or Not?

How much attention should cyber pros pay to comments from the "noobs" about technology and security?

April 28, 2012    /    by

Poll: What's Happening With BYOD in Government?

Opinions are all over the map on "Bring Your Own Device" (BYOD) to work. Here are some viewpoints and a poll.

April 22, 2012    /    by

Dark Clouds Over Technology: Pondering Action After Recent State Government Data Breaches

Over the past few weeks, there have been several high-profile breaches announced involving state government systems - one in South Carolina and one in Utah. My first reaction was to think: There but for the grace of God go we.

April 15, 2012    /    by

The Business of Security: Why Customer Service Matters More Than You Think - Part 3

So what is the right level of security? How do you know if you have gone too far, or not far enough in protecting critical systems? Do all business functions need the same level of security?

April 14, 2012    /    by

Titanic Mistakes: Five Pragmatic Lessons from Spectacular Technology Failures

Everyone is talking about the sinking of the Titanic and they should be. Here are five lessons for technology and security professionals from the sinking of the Titanic ...

April 9, 2012    /    by

Delivering Cybersecurity With Customer Focus: Who, When, Where and How

So how can this customer service theme work for security professionals? Allow me to tell you a true story.

April 2, 2012    /    by

Customer Service is a Priority for Security Pros Too

Several hundred people had gathered for a second morning to hear the results and ask questions regarding the recently completed Gartner study, which covered all aspects of Michigan Governments Information, Communications and Technology (ICT).

March 28, 2012    /    by

Is America Outgunned in Cyber?

Shaun Henry, the FBIs top cyber cop and executive assistant director responsible for cyber, told the Wall Street Journal (WSJ) that we're not winning and that the current approaches being used by the public and private sectors are: "Unsustainable. Computer criminals are simply too good and defensive measures too weak to stop them."

March 22, 2012    /    by

Lawsuits Challenge Privacy Policies

Internet privacy has long been a hot-button issue. Central questions are being asked about who owns what data, how that data can be used by various companies to target individuals in marketing and whether users can opt-in or opt-out of various data-sharing approaches. Just as in other areas of life in America in 2012, these questions are often end up being settled in the courts.

March 18, 2012    /    by

Perspectives on IT Security in Eastern Europe: First Impressions from Two Very Different Cities

I traveled to Eastern Europe last week to speak at two different one day cybersecurity conferences that are a part of a series of events known as the IDC IT Security Roadshow 2012.