Two of the potentially challenging things about doing information and cyber security risk assessments are being able to easily leverage any existing risk assessments done by other areas of the organization and being able to integrate the risk assessments we do with the existing risk ratings already being compiled and aggregated by the ERM team—assuming […]
Man vs. machine: where are you going to put your faith?
Yada, yada, yada…AI…big data…security tools…ever increasing threats…AI for good and evil…keeping ahead of the bad guys…yada, yada, yada. That’s a pretty good summary of the security “news” I get in my inbox most days, but on this particular day, I was told that “advanced, AI-based security tools are the only way to plan your defense […]
Getting past the possibility (or why threat-based security will get you nowhere)
Yesterday, I was re-reading the FAIR book, Measuring and Managing Information Risk: A FAIR Approach, and something jumped out at me that I’d forgotten the first time I’d read it. The notion of getting hooked on the possibility of an event. Of course, the FAIR book poo-poos all over the qualitative risk assessment – and, […]
Boys, wolves and Chicken Little
Folktales and fables are ways to make sure we learn life’s essential lessons both easily and at an early age. And two of the ones that I think are most relevant to what we do as security professionals are The Boy Who Cried Wolf and Chicken Little. Quick refreshers might be in order, so here […]
Staring down the red-eyed monsters
Tonight I watched my son have a white-hot meltdown. It’s never happened before, but then again, he’s never been stuck in the house with the rest of us for going on 7 weeks now either. So, I have little doubt that a lot of the frustration and fears about what’s happening came out all at […]
- « Previous Page
- 1
- …
- 5
- 6
- 7
- 8
- 9
- …
- 59
- Next Page »