|
You are here |
thomlangford.com | ||
| | | | |
www.nettitude.com
|
|
| | | | | Nettitudes Managed Security Services cover the unique cybersecurity vulnerabilities your organisation is exposed to. Partner with us. | |
| | | | |
tl2security.com
|
|
| | | | | In the last post, I looked at some of the less apparent activities upon becoming a new CISO, namely: Stop thinking that infosec is your business. Stop making technology purchases. Ask your vendors to explain what you have in your services inventory. In this post, we will take this a step further and closer to... | |
| | | | |
blog.nettitude.com
|
|
| | | | | Do your organisations current security measures satisfy the following five functions in the event of a cyber-attack? | |
| | | | |
www.gabrieljiva.com
|
|
| | | Of the three hard problems in computer science, the one I probably spend the most time on is "naming things". (Off-by-one errors are too often the bane of my programming existence thoug... | ||