to learn more about MatthewRosenquist, share content, and exchange messages and invites.
Not a member? Join Now!
to create and rate content, and to follow, bookmark, and share content with other members. Not a member? Join Now!
Last February, President Obama issued Executive Order 13549: Improving Critical Infrastructure Cybersecurity. Its intent is to drive new levels of security into the critical infrastructure of the U.S., systems like da... NIST Developing New National Cyber Security FrameworkBack Security means many different things in different contexts. With Information Security, it should be about protection of an asset from a known threat. But many times there are biases to security solutions based on cont... Information Security – it’s not only about the technical controls!Back Brian Krebs has a great blog on the massive Virut botnet and its take-down last week. Run from over 23 domains in Poland, Virut was estimated to have many hundreds of thousands of bots worldwide, and was "custom... Botnets are more than just malwareBack Security metrics are a highly discussed topic within IT these days but mainly due to the need of understanding how well security controls are working to protect against threats to Confidentiality, Integrity, and Avail... IT Security Metrics as part of a Good IT Security ProgramBack Justification for Information Security expense can be difficult in today’s economic environment. Oftentimes it takes creativity and communication skills to clarify the importance of forming a reasonable balance ... Low Budget for Information Security?…Part 1Back Many companies today simply do not have a mobile strategy. This is the great void that needs to have thoughts moved into it. Consider a cohesive (and complete) alignment of when and what to deploy as well as what devi... Your first mobile strategy, a leap into the voidBack Security is a tough sell. Plain and simple. Nobody really wants security. It is necessary when we feel threatened or under attack, but it can be inconvenient, costly, and adversely affect producti... Back We beleive there is a language barrier between IT Vendors, IT, and "the business." Too often a discussion starts with features, functions, and demos, when really everyone wants to hear about value. Cost (m... If you had to pick 5, what would be the Top KPIs for a CIO, or IT Department?Back It seems that you can’t go anywhere these days without hearing talks about cloud computing and how this new paradigm shift is going to change the use of the Internet in the coming years. But you can also hear th... Information Security in Cloud Computing Could Be BetterBack Google is the latest major player to establish a financial reward bounty for reporting software bugs in their products. Opinions differ on paying outsiders for vulnerabilities in such a manner, but for the recor... Bounties on Security Software BugsBack Download the Whitepaper: Whitepaper: Prioritizing Information Security Risks with Threat Agent Risk Assessment Intel IT has developed a threat agent risk assessment (TARA) methodology that distills the i... Whitepaper: Prioritizing Information Security Risks with Threat Agent Risk AssessmentBack I am fresh off sabbatical and back in the trenches implementing 2.0 technologies within our enterprise. This year has been crazy busy. It was our big year of deploying the first phases of our multi-phased approa... All I Want For Christmas is my E2.0Back After posting the video and opinion paper It is Time for a Data Security Revolution! a reader posed a simple yet deep question. GroogFish, in the YouTube video comments asked ...who is supposed to start this "re... Who should start the ‘data security revolution’?Back The shortened URL's (like bit.ly or tinyurl) is a great idea to share long URL's, especially in Twitter. As a person sharing those URL's, it's a great help. Some services help you to track statistics for click on the ... Shortened URL - do u like them or hate them?Back Yesterday I wrote a blog titled “Submarines, Stealth Fighters and Evolving Needs of Information Security” in the Server Room where I discuss some new server technologies aimed at better securing data from ... IT Information Security – The First Layer of Defense is PeopleBack Risk metrics are the heart and soul of information security indicators. An increasing proliferation of tools and assessments has emerged, attempting to quantify states of information security. Given the na... The Sad Story of Information Security Risk MetricsBack Research in how bacteria communicate and cooperate may be the future lessons of how computer malware evolves. Bacteria and malware evolution I recently watched a fascinating presentation by Bonnie Bassler on ho... Bacteria and Malware EvolutionBack Choosing the right method to measure security value is important but not necessarily intuitive. Some years ago, at the prodding of our department training expert, I developed a class teaching how to think crit... Top Techniques for Measuring Security ValueBack Everyone wants information security to be easy. Wouldn’t it be nice if it were simple enough to fit snugly inside a fortune cookie? Well, although I don’t try to promote such foolish nonsense, ... Fortune Cookie Security Advice - January 2009Back It's inevitable… a few times a week, my system slows to a crawl doing seemingly mundane tasks. Moving from one application to the next, or even navigating our intranet becomes a trial of patie... Balancing Act: Protection and ProductivityBack