As noted before – the People — Process — technology image with an image of the books I have written, as well as Filotimo Here…
NIST Framework is a good base to create a security policy. I have discussed NIST Framework at my blogsite (oversitesentry.com) and there are 6 pieces…
Subscribe to continue reading Subscribe to get access to the rest of this post and other subscriber-only content. Type your email… Subscribe Already a subscriber?
I wanted to make a point of posting for my new video out on all 3 areas as mentioned in headline. Rumble Video link Youtube…
I wrote a blogpost at my oversitesentry website… here is one the images: I also created a Rumble video: Which is where I discuss if…
My blogpost on this topic at Oversitesentry shows the NIST-80063B publication to note that a long password is better for overall security rather than a…
So we are all happy to use LLM AI’s to help us run our lives more efficiently, but I was wondering how do we test…
Do you want to spend money before or after a hacker attacks you? Do you think you are not being attacked because you are too…
What if you could see some examples of real life attacks? What about a phishing email attack? Do you know the parts of an email…
Or what could be worse? What happens when the secret service show up at your door? First do not panic – ask for a badge.…