So. You walk into a windowless room, and it’s dark. You flip the switch and turn on a light. And now it’s no longer dark. If you move into the room, the light’s still on. The room hasn’t changed, but now there’s a shadow – your shadow. You might not even notice it, but that’s what […]

Read More →

Another day, another big security vulnerability announcement. Let’s see if this one qualifies as big news by 2017 standards… Website? Check. Cheesy logo? Check. Catchy name? Check. Okay, time to patch all the things… Seriously, if your organization runs a secure website, you should check with your systems administrators about disabling RSA-based security modes or […]

Read More →

I just attended the SecureWorld Conference in Seattle, where one of the major topics was the General Data Protection Regulation, or GDPR. I’ve been tracking this regulation for some time and working on it for a while, so when I realized the majority of my fellow attendees had no idea what it was, I was […]

Read More →

By now you’ve no doubt heard all about the new wireless network vulnerability known as KRACK. We’re inundated with media coverage of this protocol-level vulnerability that affects nearly all devices. The snappy logo and video of the vulnerability’s proof of concept are everywhere. So. Is this a critical emergency that you need to drop everything […]

Read More →

An article by Kelly Sheridan on DARKReading today examines the current picture of information security outsourcing and functions that she says companies should and should not outsource. A quote from the article on security strategy and decision making: If you need help with architecture and design, Pironti advises consulting resources rather than outsourcing the entire […]

Read More →

At some point in our driving careers, most of us take a defensive driving course. They’re generally not very complicated – a mix of classroom instruction and behind-the-wheel demonstrations, designed to illustrate some of the hazards of being out on the road and techniques for handling them. As a business owner, Information Security should be […]

Read More →