Browse by Tags

Tagged Content List
  • Blog Post: Shrinking Budgets: Application Security Tools vs Process Tradeoff

    An all too familiar scene repeated itself two weeks ago. My good friend & CISO of a mid-sized technology company, lets call him Alok, went into a budget planning meeting and came out as a shadow of his former self. To be more precise a 85% version of the Alok that I know. He had just been handed...
  • Blog Post: Akshay’s Uncertainty Principle: Observing Some Metrics Changes Them

    You’ve probably heard of the famous  Heisenberg Uncertainty Principle  in Quantum physics. It states “The more precisely the position is determined, the less precisely the momentum is known in this instant, and vice versa.” --Heisenberg, uncertainty paper, 1927 This principle is related to...
  • Blog Post: Response to InfoSec X Prize Part 1

    So I’ve been quite amazed by the amount of discussion and feedback i have received from colleagues and peers on my original post on creating fundamental change through competition. I will be posting some of the written replies that I received and which people have kindly consented to having me post....
  • Blog Post: Microsoft IT Solutions: Full Drive Encryption using BitLocker

    One of the challenges that I have been focusing my team on this fiscal year has been creating new solutions that leverage the learning that Microsoft IT has had in deploying technology or solving problems. Microsoft IT generally has to deploy new technologies from Microsoft several months before they...
Page 1 of 1 (4 items)