Writings...
Articles & Postings
Protecting What It Means To Be Human Online
The SCIF: George Mason National Security Institute
April 7, 2021
The Security Talent Gap, Not Just A People Problem
October 10, 2017
Secure Data Logistics: How Information Security can Learn from Armored Cars
April 3, 2017
Why I Joined Rapid7
July 29, 2016
Evaluating Security from the Threat Actor’s Perspective
October 4, 2012
RSA Preview: Adversary ROI, Evaluating Security from the Threat Actor’s Perspective
October 4, 2012
Securing the Virtual Breach
September 6, 2012
Inside job: Home truths about cyber-insecurity
May 25, 2011
PRTM PERSPECTIVE: Understanding the Ever-Changing Cyber Security Landscape
October 2010
Mitigation, not prohibition, is best response to social media’s security risks
May 25, 2010
Blog Post: Leveraging Social Networking While Mitigating Risk
May 19, 2010
Blog Post: The Need for Session-Level Network Security
May 19, 2010
The Third Wave of FUD: Pre-emptive FUD Against Other Solution Categories
April 30, 2010
USA Services Intergovernmental Newsletter, GSA Office of Citizen Services and Communications, Protecting Personally Identifiable Information
Federal Data Privacy - Regulations and Solutions
May 2007
Tech & Learning, from Educators' eZine
Needed: National Data Privacy Legislation
March 1, 2007
Business Management Magazine, Issue 8, Data Management & Security
February 2007
Network World
Letters to the editor: Add data privacy to Congressional agenda
February 19, 2007
The Baltimore Sun
Customers' Data Must be Protected
February 2, 2007
ebizQ
Protecting Personally Identifiable Information
January 8, 2007
Government Computer News
We Need Strong National Data Privacy Legislation
August 23, 2006
The John Liner Review
Reducing the Risk of Information Leakage
Spring 2006, Volume 20, Number 1, Page 29
White Papers and eBooks
Defending the 99% (eBook)
BlueVoyant [Registration Required]
July 2019
Encryption 101: When to Apply Encryption
IANSresearch.com [Membership May Be Required]
August 2015
Encryption and Key Management Vendor Landscape
IANSresearch.com [Membership May Be Required]
April 2015
Supply Chain Security: Policy and Program Development
IANSresearch.com [Membership May Be Required]
July 2013
Secure Breach Manifesto (not sole author, but significant contributor and editor)
Data Breach Response: An Overview
IANSresearch.com [Membership Required]
December 2011
Defending Against Cyber Attacks with Session-Level Network Security
How Government Agencies Can Leverage the Power of Social Networking While Mitigating Risk
A Buyer's Guide for Network DLP
Data Discovery Approaches Utilizing Fidelis XPS
Managing the Evolving Risk of Data Leakage
Blogs