ciso

I go through quite a few blogs everyday to keep abreast of what is being said in the information security world. My daily bits posts are things that strike me as interesting and that I think you might find interesting too.

I don't usually single out a blog post all on its own, but every once in awhile I come across something that I feel deserves special attention.

Alex Hutton posted the following on the Verizon Business Security Blog today. There are some profound statements in this missive. I won't steal his thunder. Go read it. You will not be disappointed.

On Clouds and The Evolving Role of the CISO


Reblog this post [with Zemanta]

{ 0 comments }

Hello peoples. I know I said I'd be posting again by Wednesday of this week. I lied. Sorry about that. Coming back from vacation hurts in so many ways. So a couple days late, but here we go.

@jth twitted a link to a list of useful built-in Windows commands and tools by Ed Skoudis.

John Heasman has an interesting post up which talks about NTLM Fun and Games. Worth looking at.

Micki Krause over at bloginfosec.com has an article up that refers to Joyce Brocaglia's chapter in "CISO Leadership: Essential Principles for Success."

The second part of a series about Communicating About Risk is up over at riskmanagementinsight.com. Part one is here. Read them. It will be time well spent.

Jennifer Jabbusch has yet another informative post up. This one helps us understand the difference between a NAC client and an 802.1X Supplicant. Jennifer does a great job of making both topics approachable.

That's it for today. Have great one.

Kevin

Technorati Tags: , , , , ,

{ 0 comments }