IT Acronyms have a tendency to pop up like mushrooms on a suburban lawn after a 3-day rain storm. Even seasoned pros occasionally find themselves stumped by one or two that have slipped past their radar. After learning quite a while back that BYOD didn’t stand for
Read more →This post is a follow-on to the series I began a few weeks back on mobile app development in general and Android coding in particular. It’s also the concluding post in the series. The previous post on getting started with Android development walked you through the steps
Read more →Last Tuesday (2/28/2017) Amazon’s AWS S3 web service was intermittently unavailable. S3 (Simple Storage Service) is one of the many web services hosted on the Amazon Web Services platform, AWS. It’s also the most used service hosting everything from the image files used by websites both small
Read more →There are some things in life that were simply meant for each other: peanut butter and jelly, snow and Christmas, and Friday night and pizza. In the case of pizza, it goes well with pretty much anything, especially cold beer. When it comes to the art of
Read more →LinkedIn.com recently reported a spike in job applications for October 2016. At the same time, they revealed their Top Skills of 2016, an annual list of skills employers need most. If that weren’t enough, LinkedIn.com broke things down on a global scale and included top skills across
Read more →Direct Link: http://traffic.libsyn.com/brakeingsecurity/2016-013-michael_gough-the_5_Ps.mp3 iTunes: https://itunes.apple.com/us/podcast/brakeing-down-security-podcast/id799131292?mt=2 (look for the episode starting with “2016-013”) We discuss a model that Michael Gough used while he was at HP. The Information Security and Service Management (ISSM) Reference model can be used to help companies align their IS and IT goals with
Read more →We’ve reached peak “Br[i|y]an” this week when we invited our friend Brian Engle on to discuss what his organization does. Brian is the Executive Director of the Retail Cyber Intelligence Sharing Center – R-CISC. “Created by retailers in response to the increased number and sophistication of attacks
Read more →#Jay #Schulman is a consultant with 15+ years of experience in helping organizations implementing #BSIMM and other compliance frameworks. For our first #podcast of 2016, we invited him on to further discuss BSIMMv6 and how he has found is the best way to implement it into a
Read more →When we wanted to have Martin Fisher on, it was to discuss ‘Security Mandate vs. Security Influence’. We wanted to discuss why companies treat compliance as more important, and if it’s only because business requires it to be done. And if infosec is a red-headed stepchild because
Read more →