Author: Steve Hunt

BLOG

09 May Reinventing the security perimeter

It's time to register for my upcoming GigaOm Research webinar. The Modern Perimeter & More - countering Advanced Security Threats. http://research.gigaom.com/webinar/the-modern-perimeter-and-more-countering-advanced-security-threats/...

Read More
BLOG

08 May How Spring Cleaning May Create New Information Risks

Time for Spring cleaning - but watch out for 2nd hand office equipment. Here is some of my work with McAfee and DePaul University. http://blogs.mcafee.com/business/risks-rewards-buying-selling-used-office-equipment http://blogs.mcafee.com/business/office-equipment-data-risks http://blogs.mcafee.com/business/keeping-shoes-closet-protect-privacy-buying-selling-second-hand-office-equipment-shoe Speaking of Spring cleaning and discarded data, I recalled my dumpster diving research. http://www.csoonline.com/article/2123810/identity-theft-prevention/a-real-dumpster-dive--bank-tosses-personal-data--checks--laptops.html...

Read More
BLOG

28 Feb Threats Everywhere at RSA 2014

If you've ever been to the IT security mega trade show, RSA Conference, you probably noticed the same thing. There is always a dominant theme. One year it is compliance. Another identity theft. This year, loud and clear, it was threat management. ...

Read More
BLOG

14 Feb SecurityDreamer Trends Report

Overview Each year since 2005, SecurityDreamer blogger and industry analyst, Steve Hunt, conducts surveys of end user security executives, tracking trends related to the business of security. We cover physical security and IT security equally at SecurityDreamer, carving our unique niche in the industry....

Read More
Protect your business before it's too late!