Written by Peter RamadanThird-party risk has become a rising concern as more organizations rely on external vendors, partners, and service providers for essential functions. Data...
Written by Peter Ramadan. Incident response (IR) is the backbone of any organization’s cybersecurity defense. For CIOs, CISOs, and Directors of Information Security, your IR...
Written by Peter RamadanRunning a successful security program isn’t some pleasant game of hopscotch—it’s a war, and the battlefield’s shifting under your feet every damn...
Written by Peter Ramadan. CISSP Policy is the invisible thread that binds an organization together—a web of rules, subtle yet ironclad, dictating the commotion of...
Security Gate Keeping – Annoying – Unhelpful Next time you’re bored to death and want to be bored back to life (because two negatives equal a...
Building From The Ground Up The idea of creating a security program from scratch crossed my mind many times before I had the chance to...
Cloud Security & Governance PrimerCharacteristics of Cloud ComputingOn-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed...
Podcast Episode #2 Hello All! In this podcast we discuss the value of Experience vs Certifications vs Degrees in your pursuit for employment...
Welcome to Security In the Spring of 2016, I started my new journey as a full-time security professional after being a Desktop | Infrastructure |Enterprise...
Come along and learn about where the foundation of a great Security Program starts .... With good Security policies!We take a look at what a...
- 1
- 2










