Skeeter Spray

Monday, October 24, 2016

Getting Security Buy-in from Everybody

›
Buy-in of Information Security projects / initiatives / “we should just be doing it” is a tricky thing.   While support from senior leaders...
Wednesday, June 1, 2016

What Should Information Security Be Responsible For?

›
In the Enterprise environment it seems there is always a battle around who should be responsible for what in IT.  And there is always some ...
Thursday, May 12, 2016

Is the problem local admin or change?

›
Welcome back. "...back after {an} exclusive three year tour of Europe, Scandinavia and the sub continent" (Cab Calloway in the B...
Tuesday, August 6, 2013

Threat Modeling and Security Assessments

›
Over the last several months, in creating a threat evaluation model / process and performing a security evaluation, I have come to seve...
Sunday, July 28, 2013

Creating an Action Plan from a Security Review

›
After all the work of performing a security review of an organization, it is time to create an action plan.    This plan must be somethi...
1 comment:
Monday, July 15, 2013

Threat & Vulnerability Mitigation – Asset Identification

›
No matter what you all your program (I call mine Vulnerability Management) to manage threats and vulnerabilities as they apply to your net...
Tuesday, July 9, 2013

How, What, and When to Patch

›
How an enterprise decides to manage patch administration probably varies based on who is doing it, the maturity of the Vulnerability Ma...
1 comment:
›
Home
View web version

About Me

My photo
Skeeter
Currently working as an Information Security Analyst in the commercial world. Previously spent several years working for the government in various capacities. I have worked Network, System, Personnel, and Physical security. Also did some Risk Analysis and System Admin for Unix, Windows, Networks, and a little database.
View my complete profile
Powered by Blogger.