A breach.  A data loss incident.  An insider leak.  A media report of client data loss. […]
The protection of personal information is an important aspect of anybody’s life.  Most people have a […]
Security Information and Event Management (or Monitoring) has been a round for a while and was […]
Identity provisioning has evolved significantly over the last 8-10 years, with suite and point products providing […]
The ‘insider’ is the dude in the office.  He (or she) probably works in IT and […]
Privileged Account Management is a major concern to large organisations trying to control the ever growing […]
When you think of hacking or start looking at ethical hacking and counter measures, the focus […]
Defence in Depth.  Rings of Security.  Multi-layered protection.  All well known terms when it comes to […]
A firewall.  An aggressive connotation. A wall, made of bricks and cement, literally on fire.  As […]
Many recent software development frameworks use the term “Convention over Configuration”.  The main idea behind this, […]