Part 5: The IBM “Immune System” Approach: a Security Chastity Belt? It has been awhile — I apologize! I have been busy attaining accreditation from the world’s largest security vendor, IBM! At IBM they speak about an “immune system” approach as opposed to “layers” and it’s a remarkable difference. According to them, many companies have ...
Part 4: Define, Assess and Prioritize Your Security Architecture “And a step backward, after making a wrong turn, is a step in the right direction.” ― Kurt Vonnegut, Player Piano Before we commence our discussion on security architecture as part of our security evolution, I’d like to share a recent relevant experience. While scoping ...
Part 3: What to Expect in a Security Assessment Hi again fellow cyber-security concerned business people! In my last security post (Five Areas for Complete Coverage), I promised to begin our cyber security journey with a “security assessment”. First, make sure you go into that security assessment in the right frame of mind. Focus on ...
Part 2: Five Areas for Complete Internet Security Coverage Hello again cyber security-concerned business people… Last post I wrote about the somewhat confusing landscape of cyber security. Let’s continue on that theme with an eye to removing some of the confusion. “One step at a time” is the required approach — this isn’t exactly rocket ...
Part 1: The Landscape of Internet Security in 2018 It seems that each new day brings startling new statements, broadcast loudly from internet security vendors. Statements like “It’s not a matter of if but when”, or “60% of websites are infected”, or “40% of ransomware victims declare bankruptcy”, or “The average discovery of infections in ...