Articles on Leadership
- Leadership Saying Something Nice About Information Security
- Tools Common Failures of Information Security Tools (Part 2) HIPS can miss attacks or wrongly block legitimate actions. Log management may fail to capture necessary events or confuse analysts with poor reporting. Vulnerability management tools may miss patches...
- Risk Management How Information Security Professionals Are Different
- Assessments 3 Reasons Why People Choose to Ignore Security Recommendations People avoid information that challenges beliefs, demands undesired action, or causes unpleasant emotions—all common with security assessments. Recipients may resist findings that contradict "my...
- Assessments Why Your Security Assessment Recommendations Get Ignored Security assessment recommendations get ignored for several reasons: reports go unread due to poor writing or checkbox compliance, readers disbelieve findings that contradict their views, IT staff...
- Risk Management Cyber Warfare Encompasses Only Some Security Concerns Cyberwar discussions focus on mega breaches, but thousands of small breaches occur hourly and may exceed economic losses of high-profile incidents. Military cyber capabilities don't help civilian...