Skip to content

Call +1 (888) 896-7580 for Proactive Cyber Security© Services and Solutions

Tag: information security

September 17, 2008 by Michael Peters

Juris Doctor 2 of 215

The objective analysis versus the subjective analysis? The objective, reasonable interpretation by someone in the position of the parties involved and present as witness would assume. I seem to gravitate towards the subjective rather than the objective nature of the analysis. This has been my first real challenge during law school. It has occured to… Read More

Life Learner information security, Security
May 19, 2007February 15, 2009 by Michael Peters

HORSE Project Wiki

My favorite pet project is the Holistic Operational Readiness Security Evaluation otherwise known as the HORSE Project. The intention is ultimately to raise the proficiency level of information security auditors, security practitioners, financial auditors, and anyone who verifies that controls exist over business systems.

HORSE Project, Projects horse project, information security, Security

Posts navigation

Newer posts →

Looking for Something?

Recent Updates

  • MSPs and Supporting Modern Compliance
  • Passwordless Authentication and the Identity Perimeter
  • Salt Typhoon, Rootkits, and Compliance
  • CISA and Cross-Sector Cybersecurity Performance 
  • CISA, Compliance and the Industry Engagement Platform (IEP) 
  • How to Navigate Evolving State Privacy Laws
  • Lessons From MongoDB And MongoBleed
  • Tech Debt and Reliance on Open-Source Security
  • What Is Brickstorm Malware?
  • Why Risk Reduction Matters for Compliance

Site Administration

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org