Steve Hunt of Hunt Business Intelligence and Security and Current analyst Vic Wheatman presents how to prepare for and manage risk in an “age of advanced threats.”
Steve Hunt of Hunt Business Intelligence and Security and Current analyst Vic Wheatman presents how to prepare for and manage risk in an “age of advanced threats.”
It's time to register for my upcoming GigaOm Research webinar. The Modern Perimeter & More - countering Advanced Security Threats. http://research.gigaom.com/webinar/the-modern-perimeter-and-more-countering-advanced-security-threats/...
Time for Spring cleaning - but watch out for 2nd hand office equipment. Here is some of my work with McAfee and DePaul University. http://blogs.mcafee.com/business/risks-rewards-buying-selling-used-office-equipment http://blogs.mcafee.com/business/office-equipment-data-risks http://blogs.mcafee.com/business/keeping-shoes-closet-protect-privacy-buying-selling-second-hand-office-equipment-shoe Speaking of Spring cleaning and discarded data, I recalled my dumpster diving research. http://www.csoonline.com/article/2123810/identity-theft-prevention/a-real-dumpster-dive--bank-tosses-personal-data--checks--laptops.html...
Doug Powell, Manager of SMI Security, Privacy & Safety at BC Hydro, and Steve Hunt of Hunt Business Intelligence, continue the discussion on ESRM for Critical Infrastructure protection.
Speaking at MISTi 7 Secrets of Social Engineering.
If you've ever been to the IT security mega trade show, RSA Conference, you probably noticed the same thing. There is always a dominant theme. One year it is compliance. Another identity theft. This year, loud and clear, it was threat management. ...
Business Resumption Planners Association (BRPA) Holiday Luncheon Presentation: “Guards, Guns, Gates, and Google” by Steve Hunt....
Overview Each year since 2005, SecurityDreamer blogger and industry analyst, Steve Hunt, conducts surveys of end user security executives, tracking trends related to the business of security. We cover physical security and IT security equally at SecurityDreamer, carving our unique niche in the industry....
Articulating the Value of Security...
I am also the editor of the Neohapsis Labs blog. The following is reprinted with permission from http://labs.neohapsis.com/ by J. Schumacher Security professionals have been following the collective of Internet users calling themselves Anonymous for a few years now as they cause cyber mayhem to understand...