Click. And it was gone again. For the SECOND time today… Welcome to my world today. You see, in addition to last year’s Cape Town water crisis, South Africa also has a small issue with electricity generation. Ok. You’re right. It’s not so small. Yesterday marked the first appearance of Stage 4 loadshedding, which basically […]
Is your security program making you fat?
Did you know there’s far too much in common with yo-yo weight loss programs and your run-of-the-mill security program? Here’s the deal: Published psychology research points out that fad diets – you know, the ones that say you’re going to lose 21 pounds in 10 days or something like that – and *especially* repeated bouts […]
5 signs you have a security governance problem
This one’s short and sweet, but it still kinda surprises me how many people don’t really get what security governance is about. So let’s clear that one up first. It isn’t just do I have clearly defined roles and responsibilities and reporting structures defined for everything in my purview as a security leader. It’s also […]
Embracing your “Rawhide” moment
When I was in university, I lived in a fraternity… No, not *that* kind. It was much more “Revenge of the Nerds” than “Animal House” or the land of the super jocks. And one of the main features of “the house” was the TV room. I know I’m dating myself here, but if you were […]
Don’t we already have this solution from IBM? Why aren’t you just using that?
During one of the recent live Q&A calls for our ongoing “Building an Effective Security Program with SABSA®” pilot course, someone asked the following question: “Now that we have some tools and frameworks to help us understand what the organization’s customers really want, how do we really use these with security customers [the “business”] so […]
- « Previous Page
- 1
- …
- 55
- 56
- 57
- 58
- 59
- 60
- Next Page »