Archive for 'Risk Management' Category
As lines of code continue to replace humans and physical devices, quality control is essential…and often overlooked. An article review. Looking back over the last decade or two it is easy to see how computers have changed physically as they shrank in size, spreading to our pockets and beyond, but another change was going on […]
While Many Devices Have Already Been Patched, Many More May Never Be… An article review. When does exploit news cross the line into being a trend? How about when it impacts essentially every single wi-fi enabled device? That’s the takeaway from the recently announced vulnerability in the WPA2 wireless security standard, detailed in this TechCrunch […]
Infotex is finally ready to say something about the Equifax Breach, the Ultimate Educational Moment. This Jolley | Hadaway article will explain why we’ve been silent, ’til now!
Two Salesforce security team members were let go following their presentation of a new testing platform. An article review. Before you join that panel discussion of disgruntled bankers, consider this story that comes to us by way of Joe Cychosz: a pair of Salesforce security team members were let go shortly after their presentation at the […]
A new study reveals half of the employers think their biggest risk comes from the inside. An article review. When considering threats that your network may face, how often do you consider the people who work for you? A new study from Kaspersky shows more than half of businesses see their employees as their biggest […]
Dan has whittled all the noise to five resources a Small Business Owner should investigate (and utilize).
Recognizing early signs of trouble can save you from big issues later. A Jolley|Hadaway Article Maybe you’ve already seen some of the signs yourself. Your mouse cursor may move on its own, when you’re not touching it. Or you get notifications for a delivery, but the address isn’t yours. Those are some dead canaries: signs […]
We’ve identified a whole new set of trend articles in Information Security that those in the field should know about, and while our take on this year’s installment is coming a little late we think you’ll agree that there have been plenty of new developments since last year!
The seven best trend articles in 2016 . . . But these seven are worth the read! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Each new year brings with it a new set of trends that Information Security Officers should be aware of, and […]
. . . they’re not required . . . But they do have a place! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . There is a myth out there that speed bumps are required for all weblinking relationships. This is simply not true. They are […]