Home‎ > ‎

Writings...

Blogs

Articles & Postings

The Security Talent Gap, Not Just A People Problem
MISTI Infosec Insider
October 10, 2017

Secure Data Logistics: How Information Security can Learn from Armored Cars
MISTI Infosec Insider
April 3, 2017

Why I Joined Rapid7
Rapid7 Community
July 29, 2016

Evaluating Security from the Threat Actor’s Perspective
SC Magazine UK
October 4, 2012

RSA Preview: Adversary ROI, Evaluating Security from the Threat Actor’s Perspective
SafeNet Data Protection Blog
October 4, 2012

Securing the Virtual Breach
SafeNet Data Protection Blog
September 6, 2012

Inside job: Home truths about cyber-insecurity
FierceCIO.com
May 25, 2011

PRTM PERSPECTIVE:  Understanding the Ever-Changing Cyber Security Landscape
prtmgov.com
October 2010

Mitigation, not prohibition, is best response to social media’s security risks
fcw.com
May 25, 2010

Blog Post:  Leveraging Social Networking While Mitigating Risk
fidelissecurity.com
May 19, 2010

Blog Post:  The Need for Session-Level Network Security
fidelissecurity.com
May 19, 2010

The Third Wave of FUD: Pre-emptive FUD Against Other Solution Categories
fudsec.com
April 30, 2010

USA Services Intergovernmental Newsletter, GSA Office of Citizen Services and Communications, Protecting Personally Identifiable Information

Federal Data Privacy - Regulations and Solutions
May 2007

Tech & Learning, from Educators' eZine
Needed: National Data Privacy Legislation
March 1, 2007

Business Management Magazine, Issue 8, Data Management & Security

Understanding The Impact Of Different Approaches To Content Recognition For Securing Personally Identifiable Information
February 2007

Network World
Letters to the editor: Add data privacy to Congressional agenda
February 19, 2007

The Baltimore Sun
Customers' Data Must be Protected
February 2, 2007

ebizQ

Protecting Personally Identifiable Information
January 8, 2007

Government Computer News
We Need Strong National Data Privacy Legislation
August 23, 2006

The John Liner Review

Reducing the Risk of Information Leakage
Spring 2006, Volume 20, Number 1, Page 29


ċ
PRTM_Cyber_Security_Landscape.pdf
(58k)
David Etue,
Jul 26, 2011, 9:57 AM
Comments