On Point

Using Technology to Aid the Opioid Crisis’ Innocent Victims

and September 11th, 2018

Fear of sharing confidential information is the most cited roadblock to using technology to address the current wave of opioid crisis. But secure information sharing happens every day in areas like national security. The crisis warrants use of equivalent cybersecurity controls to manage risk. Our nation is in a war with opioids, why not arm ourselves with every available weapon?

Continue reading...


Security

Data Security – The Non-Obvious Facets

August 27th, 2018

A lot is already known and experienced about data security. This blog tries to slice and dice the data security paradigm differently, with the aim of providing a different perspective. The hope is that, different perspectives lead to different viewpoints, thoughts, realizations and ideas. If this blog creates a new thought or idea, and leads to an ‘aha’ moment, then it’s a purpose well served.

Continue reading...





Security

TrustCheck: Challenging Assumptions in Cyber Risk Management

July 27th, 2018

When I was 12 years old, my dad told me, “Never assume, it makes an ass out of u and me.” I don’t recall the context of the discussion, but I do remember responding appropriately with a groan. As I got older, I realized that assumptions are a necessary part of decision-making. But it’s also wise to challenge those assumptions—any time I start to question mine, I think back to that #DadJoke. Cyber risk management is heavily dependent on assumptions. As security leaders, we rely on heat maps, vulnerability counts and patches.... read more.

Continue reading...