- Malware My Upcoming Presentations: Career, Malware, Social Media
- Training Traits of a Good Manager of an Information Technology Team
Technical expertise rarely correlates with management ability. Google research found employees valued even-keeled bosses who made time for one-on-ones, helped puzzle through problems by asking...
- Leadership 7 Inconvenient Truths for Information Security
Employees use personal devices for work, reuse passwords, write credentials down, click on links, and disable security software. Acknowledging these common behaviors as reality rather than pretending...
- Risk Management Turning Information Security Architects into Chefs
Some architects rigorously follow frameworks (recipe-diehards); others improvise based on experience. Neither approach alone suffices. True architects know design patterns and control frameworks for...
- Career 6 Tips for Hiring and Working With Security Consultants
Before engaging security consultants, understand your requirements to stay in control. Reach out to multiple firms for perspectives and price validation, assess who specifically will work on the...
- Product Management Security Products and Services: The Long Tail of SMB Customers
SMBs comprise roughly 80% of the potential security market—the long tail—but require different product, pricing, and marketing models than enterprises. Cloud services make security more affordable,...