The Perspective of a Cyber Security Leader – An Interview with Bill Boni
Who is Bill Boni? Retired former Senior Vice President Information Security at T-Mobile USA and Corporate Security Officer at Motorola Bill Boni’s Biography Bill Boni is one of the leading information risk management practitioners based in the USA, with broad experience in all
Developing a Highly Skilled IT Security Workforce
Bill Boni is one of the leading information risk management practitioners based in the USA, with broad experience in all aspects of creating, sustaining, and transforming security protection for organizations. A visionary information security leader with outstanding written and verbal
Four Strategic Principles of Network Security Design
We recently looked at the CIS 20 – a list of 20 key controls that you should implement within your organization to maintain comprehensive cybersecurity. A recurring element in these controls is the importance of protecting your network: controls 9,11
The CIS 20 Foundational – Beyond the Basics
Beyond the Basics — CIS 20 Part Two – Controls 7-16 All organizations need a roadmap for their cybersecurity defense. Piecemeal or fragmented defense strategies, in response to the latest cyberthreat, leave gaps for attacker exploitation. The Center for Internet Security
2020 Top 5 Cyber Security Predictions
Top 5 Cyber Security Predictions for 2020 In conversations with industry analysts, our customers, combing through the statistics like Comparitech's breach data and ultimately talking amongst ourselves we came up with 5 IT security predictions for 2020 that may not be
The Benefits of Using a SIEM to Improve IT Security
A SIEM’s Role in Network Security Analysis and Monitoring We put together a series of blog posts that deal with Network Security Design and Log Monitoring that are hopefully providing you clear, straightforward information about the real basics of Network Security.
The Keys to Network Security and Monitoring
The Fundamentals of Network Security Analysis and Monitoring In a Blog Post we wrote titled “Network Security Design is Critical to Eliminating Security Gaps and Reducing Costs” – “The 5 Pieces to the Cybersecurity Puzzle,” we discussed the five core elements
Network Security Design is Critical to Eliminating Security Gaps and Reducing Costs
The 5 Pieces to the Cybersecurity Puzzle Network security design and network architecture have often been pushed to a secondary role as organizations invest in technology to solve their security concerns and migration to the cloud and the additional of countless