Articles & Postings

The Security Talent Gap, Not Just A People Problem

MISTI Infosec Insider

October 10, 2017

Secure Data Logistics: How Information Security can Learn from Armored Cars

MISTI Infosec Insider

April 3, 2017

Why I Joined Rapid7

Rapid7 Community

July 29, 2016

Evaluating Security from the Threat Actor’s Perspective

SC Magazine UK

October 4, 2012

RSA Preview: Adversary ROI, Evaluating Security from the Threat Actor’s Perspective

SafeNet Data Protection Blog

October 4, 2012

Securing the Virtual Breach

SafeNet Data Protection Blog

September 6, 2012

Inside job: Home truths about cyber-insecurity


May 25, 2011

PRTM PERSPECTIVE: Understanding the Ever-Changing Cyber Security Landscape


October 2010

Mitigation, not prohibition, is best response to social media’s security risks


May 25, 2010

Blog Post: Leveraging Social Networking While Mitigating Risk


May 19, 2010

Blog Post: The Need for Session-Level Network Security


May 19, 2010

The Third Wave of FUD: Pre-emptive FUD Against Other Solution Categories


April 30, 2010

USA Services Intergovernmental Newsletter, GSA Office of Citizen Services and Communications, Protecting Personally Identifiable Information

Federal Data Privacy - Regulations and Solutions

May 2007

Tech & Learning, from Educators' eZine

Needed: National Data Privacy Legislation

March 1, 2007

Business Management Magazine, Issue 8, Data Management & Security

Understanding The Impact Of Different Approaches To Content Recognition For Securing Personally Identifiable Information

February 2007

Network World

Letters to the editor: Add data privacy to Congressional agenda

February 19, 2007

The Baltimore Sun

Customers' Data Must be Protected

February 2, 2007


Protecting Personally Identifiable Information

January 8, 2007

Government Computer News

We Need Strong National Data Privacy Legislation

August 23, 2006

The John Liner Review

Reducing the Risk of Information Leakage

Spring 2006, Volume 20, Number 1, Page 29

White Papers and eBooks

Defending the 99% (eBook)

BlueVoyant [Registration Required]

July 2019

Encryption 101: When to Apply Encryption

IANSresearch.com [Membership May Be Required]

August 2015

Encryption and Key Management Vendor Landscape

IANSresearch.com [Membership May Be Required]

April 2015

Supply Chain Security: Policy and Program Development

IANSresearch.com [Membership May Be Required]

July 2013

Secure Breach Manifesto (not sole author, but significant contributor and editor)

Data Breach Response: An Overview

IANSresearch.com [Membership Required]

December 2011

Defending Against Cyber Attacks with Session-Level Network Security

How Government Agencies Can Leverage the Power of Social Networking While Mitigating Risk

A Buyer's Guide for Network DLP

Data Discovery Approaches Utilizing Fidelis XPS

Managing the Evolving Risk of Data Leakage