Reflection On A Decade Of Hackerspace Expansion

A few days ago I was invited to a party. Party invites are always good, and if I can make it to this one I’ll definitely go. It’s from a continental European hackerspace, and it’s for their tenth birthday party. As I spent a while checking ferries and flights it …read more

Continue reading Reflection On A Decade Of Hackerspace Expansion

A Well-Written Scope Document Can Save Your Security Project

With a well-written scope document, your team can work through a creative process that helps everyone come to the same understanding, share their opinions, work out tensions and feel heard.

The post A Well-Written Scope Document Can Save Your Security Project appeared first on Security Intelligence.

Continue reading A Well-Written Scope Document Can Save Your Security Project

Compliance is Only the Tip of the Cloud Security Iceberg

The post Compliance is Only the Tip of the Cloud Security Iceberg appeared first on DivvyCloud.
The post Compliance is Only the Tip of the Cloud Security Iceberg appeared first on Security Boulevard.
Continue reading Compliance is Only the Tip of the Cloud Security Iceberg

How to Improve Your Board’s Oversight of Digital Transformation Efforts

A recent National Association of Corporate Directors and Marsh & McLennan Companies report offered recommendations that CISOs can use to help their organizations manage digital transformation.

The post How to Improve Your Board’s Oversight of Digital Transformation Efforts appeared first on Security Intelligence.

Continue reading How to Improve Your Board’s Oversight of Digital Transformation Efforts

Everything You Need to Know About Azure Infrastructure – August 2019 Edition


The half-year point has passed meaning that Azure (and Windows/Windows Server) are into a new planning & development cycle.

The post Everything You Need to Know About Azure Infrastructure – August 2019 Edition appeared first on Petri.

Continue reading Everything You Need to Know About Azure Infrastructure – August 2019 Edition

The Many Dimensions of Effective CISO Leaders

Reading Time: 5 minutes Does your CISO have the leadership and business qualities necessary to drive effective management of cyber risks? Let’s explore four dimensions that CISOs must learn to master.

The post The Many Dimensions of Effective CISO Leaders appeared first on Security Intelligence.

Continue reading The Many Dimensions of Effective CISO Leaders

Microsoft acquires data privacy and governance service BlueTalon

Microsoft today announced that it has acquired BlueTalon, a data privacy and governance service that helps enterprises set policies for how their employees can access their data. The service then enforces those policies across most popular data environments and provides tools for auditing policies and access, too. Neither Microsoft nor BlueTalon disclosed the financial details […] Continue reading Microsoft acquires data privacy and governance service BlueTalon