News

Writing and Quotes

October 2013 – SearchCloudSecurity
Five cloud computing security concerns and the products tackling them

May 17, 2013 - TechNewsWorld
Criticism: A Security Chief’s Most Valuable Resource

April 23, 2013 - TechNewsWorld
Android: A Second Career in Security?

April, 2013 – InformationWeek Reports
10 Key Compliance Pitfalls — And How To Avoid Them

March, 2013 – InformationWeek Reports
Monitoring and Reporting IT Security Risk In Your Organization

February 28, 2013 – SearchCompliance
HIPAA compliance requirements not just for health care anymore

February 22, 2013 – TechNewsWorld
Keeping Up With the Future: Risk Management for Rapid Technology Adoption

February 8, 2013 – SearchCloudSecurity
Understanding the CSA Cloud Controls Matrix and CAIQ

January 3, 2013 – SearchSecurity
Threat detection taxonomy: Anomaly detection methods in the enterprise

December 21, 2012 – TechNewsWorld
SMBs Can Be More Secure With Cloud, Virtualization, BYOD

December 17, 2012 – InformationWeek and DarkReading
Applications Monitoring For Security Professionals

December 17, 2012 – SearchCloudSecurity
Assessing the value of cloud security threat intelligence services

November 26, 2012 – SearchCloudSecurity
CSA Cloud Metrics Validate Perceptions on Cloud Computing Risk

November 13, 2012 – TechNewsWorld
Disaster Planning on an SMB Shoestring

October 20, 2012 – TechNewsWorld
Open Source Ammo for the SMB Security Arsenal

October 3, 2012 – TechTarget
Five Tips to Improve a Threat and Vulnerability Management Program

October 2, 2012 – Information Security Magazine, Feature Article
Best Practices for Threat Management

October 2012 – Information Week Report
Network Monitoring as a Security Tool

September 25, 2012 – TechNewsWorld
How Much IT Policy is Too Much?

September 19, 2012 – TechTarget
Quoted in Little Being Done to Prevent Web Application Threats

August 21, 2012 – TechNewsWorld
5 Warning Signs of Ineffective Security

August 13, 2012 – SearchCloudSecurity
Software License Management in the Cloud: A Complex Process

July 24, 2012 – TechNewsWorld
Refining Due Diligence for Enterprise Open Source

July 23, 2012 – InformationWeek
2012 Regulatory Compliance Survey – Article Excerpt
2012 Regulatory Compliance Survey – Full Report

July 17, 2012 – DarkReading
Identity And Access Management: An Introduction – Article Excerpt
Identity And Access Management: An Introduction – Full Report

July, 2012 – TechTarget
Community cloud not a cure-all for cloud compliance

July, 2012 – TechTarget
Audit management: Five strategies to streamline the PCI audit process

June 19, 2012 – TechNewsWorld
Process Maturity and the Fine Art of Control

June, 2012 – TechTarget
Had enough? Alleviating the effects of vendor governance overload

June, 2012 – TechTarget
Cloud computing vendor lock-in: Avoiding security pitfalls

May 22, 2012 – eCommerce Times
Isolated Systems Need Love Too

May 21, 2012 – TechTarget
Enterprise Antimalware Excess? Managing Antimalware Security Products

May 15, 2012 – TechTarget
Leveraging Microsoft Azure Security Features for PaaS Security

May 10, 2012 – DarkReading
Quoted in PCI Council Introduces New Certification & Training Program

May 3, 2012 – Washington Times
Quoted in Romney Super PAC Donors Put at Credit Card Risk

May 2, 2012 – TechTarget
Quoted in SSC’s New PCI Point-to-Point Encryption Guidance Outlines Testing Procedures

April 27, 2012 – SearchSecurity.com Security School

April 24, 2012 – TechNews World
The Lighter Side of IT Consumerization

April 24, 2012 – DarkReading
How To Boost Enterprise Security Via FFIEC Compliance – DarkReading Report
How To Boost Enterprise Security Via FFIEC Compliance – DarkReading Article

April 23, 2012 – InformationWeek Reports
2012 Survey Federal Cybersecurity: The New Threat Landscape

April, 2012 – TechTarget
Five steps for achieving PaaS security in the cloud

March 21, 2012 – TechNewsWorld
Does Your IaaS Environment Have Sleeper Cells?

March 2, 2012 – IT Knowledge Exchange Voices of CRM
Debating PCI DSS Compliance in the Contact Center and the ‘Police State’: Two Perspectives – Podcast

March, 2012 – TechTarget
PCI virtualization compliance: Three steps for PCI compliance in the cloud

February 27 – Search Security Feature Article
NGFW: Getting Clarity on Next-gen Firewall Features

February 22, 2012 – TechNews World
When in the Cloud, Trust – but Verify

February 15, 2012 – Savvis Blog
Why “Sprawl” Matters in Security

February 13, 2012 – IANS Research Podcast
Application Security Track: Forum Podcast with Diana Kelley and Ed Moyle – Podcast

February 10, 2012 – IANS Research Member Preview
Building an Optimized Application Security Program

February, 2012 – TechTarget
Are cloud providers HIPAA business associates?

January 24, 2012 – eCommerce Times
A Strategy for Post-Virtualization Security

January 20, 2012 – SearchCloudSecurity
Quoted in PCI in the Cloud: Segmentation, Security Compliance is Possible, Experts Say

January 13, 2012 – Dark Reading Compliance Tech Center Report
Security via HIPAA Compliance

January, 2012 – TechTarget
Detecting VM sprawl in a private cloud

For older news items, please click here.

Contact
%d bloggers like this: