-
Recent Posts
Look at Categories
Archives
- March 2024
- November 2022
- October 2021
- August 2021
- June 2021
- August 2020
- December 2019
- November 2019
- October 2019
- December 2018
- September 2017
- October 2016
- March 2015
- February 2015
- January 2013
- September 2012
- August 2012
- March 2012
- October 2011
- June 2011
- May 2011
- February 2011
- December 2010
- November 2010
- September 2010
- August 2010
Search the Blog
InfoSec Governance
- Security Maturity vs Risk Based Security 24 March, 2024
- Mandatory versus Guidelines: A story of FUD 21 November, 2022
- A Little Tech – Reset Troubles with MFA 18 October, 2021
- The Fear Mongers 11 August, 2021
- Better Late than Never: My First Foray into Real Metrics 3 August, 2021
- Three Key Patterns for Information Security Programs 2 August, 2021
- The Fallacy of Permanence 16 June, 2021
- DevOps is dead, long live Dev! 7 August, 2020
- I Love the Subject of Change Control 17 December, 2019
- Unicorns (and how the Gene Kim challenges us yet again…) 27 November, 2019
Monthly Archives: September 2010
The One-Hundred-Zero-Fifty Rule
I had a employee in a security department that I was running come to me and say “We have a problem, and we need to take care of it right away!” Now we were in the midst of several major … Continue reading
Revolution or Evolution, Part II
The Security Officer I met recently told me in his “old age” he now knew that the key to security in an organization was Evolution. Engage evolution. But what does evolution mean for us InfoSec professionals? Well, I’m going to … Continue reading
Posted in Uncategorized
Leave a comment
Revolution or Evolution
I recently had a meeting with a well placed Security Officer. He made a comment that I thought really summed up the view that I hold as well regarding transformation of Information Security at a company…. “When I started working … Continue reading