top of page

The View from a High-Value Data Breach Target

There is a good amount of value in this article, specifically surrounding the perspectives of various industries concerning IT security and breach prevention.  Take a look.


Recent Posts

See All

Rethinking Software in the Organizational Hierarchy

I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and hierarchical security. The concept of least privilege and the d


bottom of page