The CCSP Cloud Security Certification is Hot, How Can I Prepare?
May 21, 2019
The (ISC)2 CCSP is hot. That’s the Certified Cloud Security Professional. It’s from the same group that offers the famous CISSP. At the end of 2018 there were 131,180 people with CISSP world-wide, and 84,557 in the U.S.A. But, only 4,518 people world-wide held CCSP. Do you want to be one of the new ones? Not What […]
Would Encryption Alone Have Prevented the OPM Hack?
Jun 8, 2015
The recent breach of the U.S. Office of Personnel Management has certainly been big news and the cause of lots of speculation. OPM says they provide over 90% of the Government’s background investigations, over two million each year. Twitter has been busy with comments about how useful the contents of background information would be for […]
Why You Need to Pay Attention to Cloud Computing
Oct 21, 2014
The adoption of cloud computing is revolutionizing today’s business. This trend has also elevated the importance of IT and business alignment because cloud enables new business models that have until now were not economically viable. A recent study confirmed this trend by showing that the vast majority of organizations of all sizes use both Software-as-a-Service […]
Some Day Soon We May Compute Covertly in the Cloud
Sep 27, 2013
Imagine that you are responsible for high-performance computing for an automobile manufacturer. Car designs need body panels limiting aerodynamic drag wrapped around engines burning fuel efficiently. But it takes big computers to model aerodynamic flow and flame front propagation. So let’s say that with a major investment in hardware and staffing your company has built […]
Watch Out, Your Data Might Wander Down the Wrong Back Alley — Part 2
Feb 26, 2013
Last week I described how data moving between your two domestic sites might be routed through another country on the other side of the world. The IETF has a nice document, Generic Threats to Routing Protocols, describing the concepts of possible attacks and impacts. Interior routing protocols like OSPF are used within one organization and […]