Threat Modeling Simplified

Posted by & filed under Content - Highlights and Reviews, information security, Information Technology, IT, Operations, privacy, security, Tech.

by Sari Greene I cringe each time I hear the oft repeated declarations that “every company will be compromised” and that “it isn’t a matter of if, but when”. These statements are the basis of the FUD (fear, uncertainty and doubt) driven cyber sales machine. What is closer to the truth is that Internet connected… Read more »

What Every Business Needs to Know About Cyber Security Now

Posted by & filed under Business, Content - Highlights and Reviews, information security, Information Technology, Operations, security, Tech.

By Neil Ford Neil Ford writes about all aspects of information security for IT Governance Ltd, the international provider of best-practice information security solutions.    According to IBM/Ponemon Institute’s 2015 Cost of Data Breach Study: Global Analysis, the average global cost of a data breach is now US$3.79 million. Although high-profile cybersecurity incidents affecting large… Read more »

The Value of CISSP Certification in Cybersecurity Leadership and How to Pass the Exam

Posted by & filed under Business, career advice, Certification & Licensure, Content - Highlights and Reviews, Operations, privacy, security.

By Sari Greene Sari Greene is an information security practitioner and entrepreneur. She is the author of Security Program and Policies: Principles and Practices, 2nd Edition and The CISSP Complete Video Course. What keeps me up at night isn’t the threat actors or the cybercriminals, the newly identified exploit, or even the prospect of every… Read more »

Building Docker Images with Chef Provisioning

Posted by & filed under Devops, infrastructure, IT, Operations, programming.

What is Chef Provisioning? Chef Provisioning is a drop-in library for Chef that gives developers and infrastructure teams an added dimension of automated system configuration: the ability to bootstrap and install a series of OS and configuration deployments onto “bare metal”. There are a variety of drivers that can be used as bare metal abstractions, including Docker, LXC, Fog… Read more »