Posts filed under: Burgess writes for RSA Conference

Data Leak = Data Compromise

[vc_row][vc_column width=”1/1″][share facebook=”true” twitter=”true” google_plus=”true” linkedin=”true” pinterest=”true” email=”true”][text_output] Have you experienced a data compromise lately? The old adages “still water finds its own level” and “moving water finds a path of least resistance” both have applicability when we think of... Read More

When do you introduce Security Awareness training?

[vc_row][vc_column width=”1/1″][text_output]A new employee shows up on day one and walks through his ID card briefing, compensation and benefits brief, and security brief, meets his new team and manager, and tries to retain all the information rushing out at him... Read More

Cyber Security Event Denial: If I don’t report it, did it really happen?

“If a tree falls in the forest and no one is there to hear it, does it make a sound?” The technological equivalent of this query within cyber security exists, unfortunately: “If a compromise occurs and no one reports it,... Read More