Articles on Leadership
- Malware Low Price as a Differentiator for Information Security Products Low price can be a security product differentiator in several ways: strengthening an ecosystem (Microsoft's free Security Essentials), as loss leaders bundled with other products, as freemium...
- Cloud Cloud Risks and the Security Community Most cloud security risks apply to IT in general and either have mitigations or have been accepted. InfoSec's role should be active participation in technical innovation, balancing risk with cost—not...
- Cheat Sheets How to Use the Security Architecture Cheat Sheet for Internet Applications
- Risk Management Risk Management: Objectivist and Subjectivist Approaches Objectivists rely purely on historical data to predict risk; subjectivists complement data with judgment about context. A coin flipped by a magician might warrant different probability assessments...
- Cheat Sheets Security Architecture Cheat Sheet for Internet Applications A cheat sheet for initial design and review of Internet application security architecture, covering four areas: business requirements (data classification, users, partners, regulations),...
- Leadership How to Be Heard in IT Security and Business. 10 Tips.