Quantcast
Channel: The State of Security » Federico DeLaMora
Browsing latest articles
Browse All 8 View Live

Network Vulnerability Scanning in Today’s Networks

In the mid-nineties, I used to have a technology column that ran in the Intranet of the bank where I started my career. The first article introduced the concept of the DMZ and suggested using the 3rd...

View Article



Your Enterprise Vulnerability Management Reality Check

I often ask technical evaluators and managers what they look for when they chose a vulnerability management solution. It is fascinating to observe how the answer varies with the maturity of the...

View Article

Configuration Compliance Also Includes Vulnerability Management

Around twenty years ago, several individuals associated with Universities started building the first vulnerability checkers. Ironically, these nascent tools were designed mainly to scan the...

View Article

Who Should Insure the Nation’s Critical Infrastructure?

A few months ago, one of the large US insurance companies ran an advertorial in a business magazine promoting a “new” cybersecurity policy. Around the same time, commentators in the blogosphere and the...

View Article

How to Make Vulnerability Management Relevant… Again

2013 was the year of the Snowden Leaks. This year, the battle to dominate the headlines is being closely fought by the Target Breach, the Hearthbleed bug and eBay’s compromise followed by a massive...

View Article


IT Security – An Escalation of Commitment

Recently, I was talking to one of our customers about how IT Security has evolved in the last 20 years. The conversation reminded me of ‘Escalation of Commitment,’ a topic studied both in Economics and...

View Article

Escalation of Commitment Part 2: Three Possible Scenarios

Following from a recent post on ‘Escalation of Commitment’, a topic studied by both Economists and Psychologist, I could not resist writing a follow-up to explore the consequences for third parties...

View Article

The CISO as a Sales Person: Part 1 – Selling to the Security Architects

After years of working in sales for small- and mid-sized software vendors, I have gotten used to the idea that everyone in the company is a salesperson. Some of my colleagues in other departments often...

View Article

Browsing latest articles
Browse All 8 View Live




Latest Images