Cyber Security

Recently, I was asked to participate in a roundtable discussion on Export Compliance, Intrusion Software, Network Surveillance and Cybersecurity in Practice at ACI’s Global Encryption Controls. On first glance, one may wonder what Export Compliance has to do with cybersecurity. If you do, then you have probably missed the recent debate around cybersecurity tools and…

+ read more

Michael Angelo
Mar 18, 2016
12:14 pm
Reads:
19,386
Score:
Unrated

Like many in the security community, I look forward to Bruce Schneier’s CRYTO-GRAM newsletter showing up in my email inbox.  With so many interesting nuggets of information and observations on so many different types of security challenges facing individuals, enterprises, and nation states, it’s always a good idea to grab a fresh cup of coffee…

+ read more

Brennan
By: Brennan
Nov 21, 2012
11:33 am
Reads:
2,705
Score:
Unrated

As some have noticed, I have been holding off on posting over the past six months. This is because I have become confused with respect as to what to comment on and what to motivate changes for. If we look at the areas I typically track (certifications, cyber legislation / controls, security incidents and technology), we…

+ read more

Michael Angelo
Aug 16, 2012
9:02 am
Reads:
4,076
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow