by Tony Asher | Sep 9, 2019 | Blogs
Cloud providers have amazing security protection and controls. Microsoft recently offered $300,000 for hackers to ‘do your worst’. (https://devclass.com/2019/08/06/microsoft-waves-300000-at-hackers-says-do-your-worst-to-azure-security-lab/). They are...
by Tony Asher | Sep 4, 2019 | Blogs
If you were given a budget of one million dollars for your security program how would you use it? How do you even go about answering that question? I once visited a company that had rooms full of security equipment and technology. They were looking to hire...
by Tony Asher | Aug 26, 2019 | Blogs
Measuring your information and cybersecurity program can be difficult. But when a metrics program is developed using the right measurements from the right sources, it can provide incredible value insights into your program, reveal weak areas, market your strengths,...
by Tony Asher | Aug 22, 2019 | Blogs
How can you measure the success and opportunities of a cybersecurity program? With so many risks, threats, vulnerabilities, and exploits in the wild it’s difficult for security leaders to clearly articulate what they are focused on, and why they are focused on...
by Tony Asher | Aug 12, 2019 | Blogs
Security Information and event management and the crossroads with threat intelligence program. Threat Intel vs . Threat Data When I meet with a client that wants to build a threat intelligence program we sometimes you have to backward architect. Threat intelligence...
by Tony Asher | Aug 5, 2019 | Blogs
Another company is in the news. Citibank has had a major breach of customer data. Articles are pouring in from quarterback security professionals pointing out the companies mistakes and cybersecurity failures. Personal Experience In Minnesota, one of...
Recent Comments