Data Protection: Culture, Tools, People, and Roles
09/06/18 In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations), I covered the background of building a culture. In this p…
09/06/18 In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations), I covered the background of building a culture. In this p…
08/30/18 As anyone that has run a network of any size has surely experienced, with one alert, there is typically (but not always) a deeper issue that may or may not generate furthe…
08/28/18 The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment a…
08/22/18 “Hello! My Name is Phoummala and I have re-occurring imposter syndrome. I struggle with this frequently and it’s a battle that I know I am not alone in.” What is Imposter …
08/14/18 In the previous blog in this series, we reviewed several types of attacks and threats, and some ways they are perpetrated. In this blog, we will become familiar with sever…
08/01/18 When the IT Show Comes to Town In the past, I’ve compared the logistics of tech conferences, tradeshows, and user groups to moon landings, touring companies, and polar exp…
07/31/18 In the first blog of this series, we became familiar with some well-used cybersecurity terminology. This blog will look at some well-known cyberattack and threat types and…
07/30/18 In my earlier post in this data protection series, I mentioned that data security and privacy is difficult: Building a culture that favours protecting data can be challeng…
07/26/18 Security should be a top priority for IT professionals within all areas of skills. One of the top pain points is how to convey the story of security to upper management, s…
07/18/18 In the first post of this blog series, we’ll cover the fundamentals of cybersecurity, and understanding basic terminology so you can feel comfortable “talking the talk.” O…
07/12/18 Building a culture that favors protecting data can be challenging. In fact, most of us who love our data spend a huge amount of time standing up for our data when it seems…
06/18/18 Agencies are turning to artificial intelligence (AI) and machine learning to bolster the United States’ cybersecurity posture. Agencies are dealing with enormous amounts o…