elevatedsecurity.blogspot.com
Elevated Security: The Cloud Security Serenity Prayer
http://elevatedsecurity.blogspot.com/2012/05/cloud-security-serenity-prayer.html
David Etue's Information Security / Cyber Security / Information Assurance Musings. The blog is titled "Elevated Security", as I believe we all need to seek higher ground in information security. [Yes, that is an intentionally complex metaphor.]. More about me available here. Opinions may not reflect that of my employer or other affiliations]. Tuesday, May 15, 2012. The Cloud Security Serenity Prayer. We mentioned the need for security professionals to know when to stop and recite the " serenity prayer.
elevatedsecurity.blogspot.com
Elevated Security: May 2012
http://elevatedsecurity.blogspot.com/2012_05_01_archive.html
David Etue's Information Security / Cyber Security / Information Assurance Musings. The blog is titled "Elevated Security", as I believe we all need to seek higher ground in information security. [Yes, that is an intentionally complex metaphor.]. More about me available here. Opinions may not reflect that of my employer or other affiliations]. Wednesday, May 23, 2012. Cloud Serenity: Controlling What We Can and Accepting What We Cannot. Cloud Serenity: Controlling What We Can and Accepting What We Cannot.
elevatedsecurity.blogspot.com
Elevated Security: October 2012
http://elevatedsecurity.blogspot.com/2012_10_01_archive.html
David Etue's Information Security / Cyber Security / Information Assurance Musings. The blog is titled "Elevated Security", as I believe we all need to seek higher ground in information security. [Yes, that is an intentionally complex metaphor.]. More about me available here. Opinions may not reflect that of my employer or other affiliations]. Monday, October 8, 2012. I was recently having a conversation with Gene Kim ( @realgenekim. He wrote up an excellent IT Revolution blog post. Lets be clear, develo...
elevatedsecurity.blogspot.com
Elevated Security: Adversary ROI Resources
http://elevatedsecurity.blogspot.com/2012/10/adversary-roi-resources.html
David Etue's Information Security / Cyber Security / Information Assurance Musings. The blog is titled "Elevated Security", as I believe we all need to seek higher ground in information security. [Yes, that is an intentionally complex metaphor.]. More about me available here. Opinions may not reflect that of my employer or other affiliations]. Thursday, October 4, 2012. RSA Preview: Adversary ROI, Evaluating Security from the Threat Actor’s Perspective. Subscribe to: Post Comments (Atom).
elevatedsecurity.blogspot.com
Elevated Security: Security and DevOps
http://elevatedsecurity.blogspot.com/2012/10/security-and-devops.html
David Etue's Information Security / Cyber Security / Information Assurance Musings. The blog is titled "Elevated Security", as I believe we all need to seek higher ground in information security. [Yes, that is an intentionally complex metaphor.]. More about me available here. Opinions may not reflect that of my employer or other affiliations]. Monday, October 8, 2012. I was recently having a conversation with Gene Kim ( @realgenekim. He wrote up an excellent IT Revolution blog post. Lets be clear, develo...
elevatedsecurity.blogspot.com
Elevated Security: Cloud Serenity: Controlling What We Can and Accepting What We Cannot
http://elevatedsecurity.blogspot.com/2012/05/cloud-serenity-controlling-what-we-can.html
David Etue's Information Security / Cyber Security / Information Assurance Musings. The blog is titled "Elevated Security", as I believe we all need to seek higher ground in information security. [Yes, that is an intentionally complex metaphor.]. More about me available here. Opinions may not reflect that of my employer or other affiliations]. Wednesday, May 23, 2012. Cloud Serenity: Controlling What We Can and Accepting What We Cannot. Cloud Serenity: Controlling What We Can and Accepting What We Cannot.
elevatedsecurity.blogspot.com
Elevated Security: November 2012
http://elevatedsecurity.blogspot.com/2012_11_01_archive.html
David Etue's Information Security / Cyber Security / Information Assurance Musings. The blog is titled "Elevated Security", as I believe we all need to seek higher ground in information security. [Yes, that is an intentionally complex metaphor.]. More about me available here. Opinions may not reflect that of my employer or other affiliations]. Friday, November 2, 2012. This is a current version of a presentation that @JoshCorman. Adversary ROI: Evaluating Security from the Threat Actor’s Perspective.
elevatedsecurity.blogspot.com
Elevated Security: Adversary ROI Presentation
http://elevatedsecurity.blogspot.com/2012/11/adversary-roi-presentation.html
David Etue's Information Security / Cyber Security / Information Assurance Musings. The blog is titled "Elevated Security", as I believe we all need to seek higher ground in information security. [Yes, that is an intentionally complex metaphor.]. More about me available here. Opinions may not reflect that of my employer or other affiliations]. Friday, November 2, 2012. This is a current version of a presentation that @JoshCorman. Adversary ROI: Evaluating Security from the Threat Actor’s Perspective.
SOCIAL ENGAGEMENT