Daily Digest for August 31st

mdpeters When business and information security are aligned, the true value of security will be apparent. [#]. mdpeters In the debate concerning insider versus outsider information security threats, consider any connection to data as an outsider threat. [#]. mdpeters @CDMmedia BI education seems to be the biggest utilization hurdle. This is true holistically, not just… Read More

KISS – Keep It Simple Security – 2009090101

I was reading the latest report published by Deloitte titled “The 6th Annual Global Security Survey.” I did enjoy the survey results and I do intend on using a portion to help shape my general information security strategy in my practice. Certain fundamentals are always sound and always obvious. One quote that I’ll comment on… Read More

Social Computing Guidelines

I have added a new governance document to the HORSE wiki that provides an example of a social computing and networking employee guideline. It is located here: http://lazarusalliance.com/horsewiki/index.php/Social_Computing_Guidelines Like so many of my corporate information security counterparts, the explosion of public applications available and the massive participation presents a new challenge in the presentation of… Read More

Daily Digest for August 25th

mdpeters New blog post: Laws of Power – 29 https://michaelpeters.org/?p=743 [#]. mdpeters New blog post: Juris Doctor 51 of 215 https://michaelpeters.org/?p=746 [#]. mdpeters New blog post: Five Traits of Outstanding Achievers https://michaelpeters.org/?p=748 [#].