My Writing
- Risk Management Turning Information Security Architects into Chefs Some architects rigorously follow frameworks (recipe-diehards); others improvise based on experience. Neither approach alone suffices. True architects know design patterns and control frameworks for...
- Career 6 Tips for Hiring and Working With Security Consultants Before engaging security consultants, understand your requirements to stay in control. Reach out to multiple firms for perspectives and price validation, assess who specifically will work on the...
- Product Management Security Products and Services: The Long Tail of SMB Customers SMBs comprise roughly 80% of the potential security market—the long tail—but require different product, pricing, and marketing models than enterprises. Cloud services make security more affordable,...
- Malware Evolving Threats: The Long Tail of Potential Data Breach Victims The "long tail" of potential breach victims—numerous SMBs comprising 80% of the population—attracts attackers who prefer quantity over quality. These targets have weaker defenses and there are many...
- Risk Management Border Bias and Risk Perception in Information Security Research shows people irrationally believe state borders can protect against disasters, underestimating risks from across the line. In security, firewalls and other devices may create similar...
- Social Networking Using Twitter for Public Relations During a Data Breach Incident Twitter can be effective for data breach PR—research shows tweets reduce negative feelings and decrease support calls, especially when from employees rather than executives. Use it to acknowledge...