|
mdpeters When business and information security are aligned, the true value of security will be apparent. [#].
|
|
mdpeters In the debate concerning insider versus outsider information security threats, consider any connection to data as an outsider threat. [#].
|
|
|
|
mdpeters New blog post: KISS – Keep It Simple Security – 2009090101 https://michaelpeters.org/?p=778 [#].
|
|
mdpeters Cloud Computing? Just say no to immature technology. [#].
|
|
mdpeters People ask me, "As a CISO, how well do you sleepat night?" Like a baby I tell them. I get up every two hours. [#].
|