Our Blog Policy
While we’re not a news service, we often use current events to comment on trends and our services.
This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our Dan’s New Leaf and Jolley|Hadaway series). Whenever we come close to “news,” it’s late on purpose, because it’s an article review that reflects on how the “news” highlights a “trend.”
One thing we try not to be is a general technology or security news website, as we believe there are a number of organizations that do this very well. While we do often post news articles, we always try to put them in the context of what this means to IT professionals now…and in the future. DO NOT RELY UPON US FOR VULNERABILITY NEWS!
We also welcome article submissions from our readers. If you think you’ve got a story that would benefit our readers, feel free to email us and let us know…you can choose to be credited in our review as the finder or remain anonymous if you wish.
Leave a comment
Many organizations spend time and money deploying endpoint protection, then think the Read more
Some small organizations continue to use customer data to generate initial passwords, Read more
Another awareness poster for YOUR customers (and users). Now that we have our own em Read more
Risk isn’t the only thing to consider when planning a decision tree. Another one of t Read more