Security

Latest Posts in Security

Data Protection: Culture, Tools, People, and Roles

In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations), I covered the background of building a culture.  In this post, I’ll be going over the data protection…

Cross-Referencing Alarms: Network Security Monitoring and Network Outage Notifications

As anyone that has run a network of any size has surely experienced, with one alert, there is typically (but not always) a deeper issue that may or may not…

Protection Methods – The Art of Data Analytics

The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although…

Beating Imposter Syndrome

“Hello! My Name is Phoummala and I have re-occurring imposter syndrome. I struggle with this frequently and it’s a battle that I know I am not alone in.” What is…

Policy and Controls – A Foundation for Threat Protection

In the previous blog in this series, we reviewed several types of attacks and threats, and some ways they are perpetrated. In this blog, we will become familiar with several…

Culture of Data Protection: Data Quality, Privacy, and Security

As I explained in previous posts on building a culture of data protection, we in the technology world must embrace data protection by design. To Reward, We Must Measure. How…

THWACKcamp 2018 Registration Now Open

When the IT Show Comes to Town In the past, I’ve compared the logistics of tech conferences, tradeshows, and user groups to moon landings, touring companies, and polar expedition planning.…

Cybersecurity Fundamentals – Attack Surfaces and Vulnerabilities

In the first blog of this series, we became familiar with some well-used cybersecurity terminology. This blog will look at some well-known cyberattack and threat types and how they can…

Culture of Data Protection: Development Counts, Too.

In my earlier post in this data protection series, I mentioned that data security and privacy is difficult: Building a culture that favours protecting data can be challenging. In fact, most…

Security Pain Points: Upper Management and Budget

Security should be a top priority for IT professionals within all areas of skills. One of the top pain points is how to convey the story of security to upper…