communications
"The most valuable of all talents is that of never using two words when one will do," proclaimed Thomas Jefferson a few...Read more
Having used Twitter for a while years, I can say that its role as social networking medium for members of the...Read more
Hershey Corporation sent an email to its customers, notifying them that Hershey’s website experienced a data security...Read more
There is surprisingly little information online about creating good information security reports. You’ll easily find...Read more
Not all information security assessment reports equal. Many present irrelevant details and are tedious to read. They...Read more
Your non-security colleagues or clients probably have a hard time telling whether you are doing your job well, unless you...Read more
Information security professionals get frustrated when their concerns are seemingly dismissed by business managers who...Read more
The key to a successful cybersecurity assessment report is to write it as a critique, not criticism. This isn't easy,...Read more
Data breaches happen to organizations of all shapes and sizes. A critical aspect of such security incidents is the...Read more
For consultants, it’s not enough to do great work for their clients. The clients also need to understand the value...Read more