by Tony Asher | Aug 22, 2019 | Blogs
How can you measure the success and opportunities of a cybersecurity program? With so many risks, threats, vulnerabilities, and exploits in the wild it’s difficult for security leaders to clearly articulate what they are focused on, and why they are focused on...
by Tony Asher | Aug 12, 2019 | Blogs
Security Information and event management and the crossroads with threat intelligence program. Threat Intel vs . Threat Data When I meet with a client that wants to build a threat intelligence program we sometimes you have to backward architect. Threat intelligence...
by Tony Asher | Aug 5, 2019 | Blogs
Another company is in the news. Citibank has had a major breach of customer data. Articles are pouring in from quarterback security professionals pointing out the companies mistakes and cybersecurity failures. Personal Experience In Minnesota, one of...
by Tony Asher | Aug 2, 2019 | Blogs
Are you concerned with moving your data to the cloud? Are your partners and vendors starting to host your solution on SaaS or PaaS model and you want to develop your security review process? Problem I get it. I was in that position when I learned, only when I...
by Tony Asher | Jul 29, 2019 | Blogs
Are you looking for someone to speak on cybersecurity? Hi, my name is Tony Asher and I speak on cybersecurity. I can speak on the various topics of information security and cybersecurity, including all the niches and pillars that make up a security...
Recent Comments