Blog

Insight on IT and Infosec

 

History has a way of repeating itself and the mistakes you make provide the most insightful and long-lasting learning.

Hacking back? – a ridiculous idea

The MIT Technology review released an article today on Five reasons “hacking back” is a recipe for cybersecurity chaos. The author is totally correct on the five reasons identified. In a nutshell, one of the challenges of cyberwarfare is that for organizations other...

Who owns privacy?

Here is a short topic on privacy that many know about but few talk about. It is about the role issues that I see between CISOs, IT and GCs in many organizations.    There is typically agreement that GCs should have the primary role in interpreting privacy...

Historical blog posts

Here is a link to a blogger site where you can find posts that I wrote as far back as 2006. There are a wide range of musings. Most are related to thoughts on the future of managing IT, managing people, trends in technology and my favorite post - how to deal with...

Your probability of a Cyber Security Breach

Probability of a data breach Your probability of a significant Cyber Security Breach may be 21%.  Every major information security methodology is risk based. That is, they require that organizations identify assets to be protected, risks to those assets, probability...