We get it. We completely understand why you still use Excel as an assessment and audit tool. We suffered through it just the same but we believe that working smarter and not harder which is why we invented ITAM IT audit software. The IT Audit Machine (ITAM IT audit software) is the patent pending, industry… Read More
Why Excel is so Old-School and how to be Cool-School
We get it. We completely understand why you still use Excel as an assessment and audit tool. We suffered through it just the same but we believe that working smarter and not harder which is why we invented ITAM. The IT Audit Machine (ITAM) is the patent pending, industry changing assessment questionnaire creation tool designed… Read More
What the Biggest Data Breaches in Retail Have Taught Us about Cybersecurity
2014 Data Breaches by Industry With the holiday season upon us, much attention turns to the retail sector, which is expected to see unprecedented activity as shoppers in a strengthening economy take advantage of seasonal deals and yet-further-expanded shopping hours. However, overshadowing the energy of the holiday shopping season, the specter of data breaches past… Read More
Secure in 60 Seconds
Secure in 60 Seconds While you slip into that Thanksgiving Day coma, take 6o seconds to beat holiday crime and stay secure. Nearly half of holiday shopping this year will be done through online merchants; about 46 percent according to the National Retail Federation. That is up slightly from last year and is another sign… Read More
WHAT IS THE IT POLICY MACHINE (ITPM)?
The Policy Machine is the awesome new way to create custom policies. Work smarter, not harder! The IT Policy Machine (ITPM) is the patent pending, industry changing policy creation tool designed specifically for the governance, risk and compliance (GRC) market space but where infinite possibilities exist even outside of the GRC and cybersecurity realms due to the intelligence and… Read More
WHAT IS THE IT AUDIT MACHINE (ITAM IT audit software)?
Why ITAM? Find out why ITAM is considered to be the best assessment tool available for your IRM and GRC needs and proactive cybersecurity! ITAM is the patent pending, industry changing assessment creation tool designed specifically for the governance, risk and compliance (GRC) market space but where infinite possibilities exist even outside of the GRC… Read More
Why In a Former Life I was a Cadaver Dog!
My career has been and adventure along the scenic route speaking conservatively which I rarely do. My number one goal is to be the best example for what I choose to focus my attention on. I rose in the corporate ranks pretty quickly and helped define what it really means to be a Chief Information… Read More
Test your OWASP knowledge and earn credit.
Test your OWASP knowledge and earn credit. Why is OWASP important? There is a frequent question we get from each of our client organizations at least twice a year and that is, “Does your organization adhere to the OWASP Top 10 and is it part of your software development life cycle (SDLC)?” Well, currently, there are… Read More
CIO, CISO, Eee Eye, Eee Eye Oh Crap a Data Breach!
How do you quantify the true cost of a data breach? How do you measure the costs against the benefits of eliminating risks, mitigating risks or accepting risks to your business effectively? The Lazarus Alliance executive leadership team has been the proverbial tip of the spear within the proactive cyber security realm well before there… Read More
Cyber Attack: United Airlines, WSJ, NYSE … Oh My!!
While United Airlines grounded their entire fleet and the Wall Street Journal was off-line and the New York Stock Exchange could not conduct trading yesterday for an extended period of time, they all have stated that they were not under a cyber attack. I do not believe in coincidences! Apparently I am not alone with this sentiment.… Read More
The Proverbial Identity Theft Bus Will Run You Over!
The Proverbial Identity Theft Bus Will Run You Over! Think about a time when you had a single credit card lost or stolen and how much of a pain that experience was. Now imagine if your entire wallet was lost or stolen and the exponential magnitude of pain in the patootie that would be for… Read More
Cyber War Waged on the United States with Massive Security Breach
Federal cyber security breach has left millions of American citizens as casualties. Lazarus Alliance responds with proactive cyber-crime prevention. Lazarus Alliance ups the ante with proactive cyber security weapons in the corporate arsenal to fight cybercrime, corporate fraud, espionage and criminal cyber-misconduct. The egregious revelations following this security breach is that the Office of Personnel… Read More
2015 State-by-State Data Breach Charts
2015 State-by-State Data Breach Charts The following standard definitions of Personal Information and Breach of Security (based on the definition commonly used by most states) are used for ease of reference, and any variations from the common definition are noted: Personal Information: An individual’s first name or first initial and last name plus… Read More
2015 State-by-State Data Breach Charts
2015 State-by-State Data Breach Charts The following standard definitions of Personal Information and Breach of Security (based on the definition commonly used by most states) are used for ease of reference, and any variations from the common definition are noted: Personal Information: An individual’s first name or first initial and last name plus one or… Read More
Embrace Adversity
“I’ve always believed that adversity can be a friend to embrace. Just don’t turn your back on it.” – Michael Peters
TakeDownCon 2015 Keynote Address
I’m honored to be invited to EC-Council’s TakeDownCon keynote speaker for the 2015 event. TakeDownCon brings together information security researchers and technical experts from corporate to underground industries, to a unique “Ethical Hacking” conference. In two days, they will present and debate the latest security threats, disclose current vulnerabilities, and share information crucial to the… Read More
Impressum
IMPRESSUM STATEMENT CONTACT AND REGULATORY INFORMATION Impressum Statement: Founded in 2000, Lazarus Alliance has been passionately on the cutting edge of IT security, risk, privacy, governance, cyberspace law, and compliance leadership, innovation, and services provided to the global community. With significant contributions and innovations such as the IT Audit Machine, The Policy Machine, Cybervisor, ContinuumGRC,… Read More
New PoSeidon Adventure is a POS Malware Threat to Retailers
The stunning reality is that the majority of retailers accepting credit cards are still vulnerable to the newest threat to accepting credit cards from consumers. Lazarus Alliance has been years ahead with proactive cybersecurity services. Researchers from the Cisco Security Solutions team have dubbed the latest malware to attack point-of-sales (POS) systems PoSeidon. Compromised POS… Read More
Now Playing: Charlotte Plott’s Biz Stories Shared Podcast
It was a pleasure visiting with Charlotte Plott as we discussed the entrepreneurial spirit, business development and a plethora of related topics during Charlotte’s Biz Stories Shared podcast. If you find a nugget of truth or derive value from Charlotte’s podcast, please let her know in social media! The podcast may be accessed here: .
Proactive vs Reactive Cyber Security on Money Radio
Recently Michael Peters, CEO of Lazarus Alliance, spent time with David Cogan of Money Radio and eLiances discussing the differences between proactive cyber security and reactive cyber security. You can replay the broadcast as heard on money radio. An overview of the discussion was when you think cyber security, what comes to your mind first? I’ve… Read More
The Security Trifecta™: an introduction.
I was reading a news article this morning about another security debacle at NASA involving the theft of a laptop containing the command and control codes for some high-tech toys like the International Space Station. The thing that amazed me the most was not that NASA would be a high value target, but that this… Read More
Is Anyone Exempt From Cyber Crime Anymore?
With a show of those virtual hands, who has been notified by their credit card company about their personal information being exposed to cyber-crime? Now, with a show of those virtual hands; who has never been notified? If you think the problem is that cyber criminals are too good; you are mistaken. The problem is… Read More
Is Anyone Exempt From Cyber-Crime Anymore?
With a show of those virtual hands, who has been notified by their credit card company about their personal information being exposed to cyber-crime? Now, with a show of those virtual hands; who has never been notified? If you think the problem is that cyber criminals are too good; you are mistaken. The problem is… Read More
Resistance is NOT Futile for Cyber Insurance Casualty Insurers.
If you think that the business general liability or even purpose built cyber insurance policies will cover you in the event of a cyber-security breach, it’s highly likely you are mistaken. In fact, it is in your carriers best business interest to deny your claim. Chances are the exemptions in your policy exclude coverage for… Read More