by Richard Barrus | Jul 17, 2018 | Third Party Risk Management
Reading Time: 3 minutes
For the last 20 months or so, we’ve worked with nearly 200 government municipalities on cyber loss control projects, now largely completed. Based on the findings from this effort, we’ve identified those areas where many...
by Scott | Mar 15, 2011 | ISO 27001 Certification
Reading Time: 2 minutes
Do you have Nephophobia? At a recent CISO Executive Network event in Philadelphia, Peter Stern from IBM began his presentation with the term Nephophobia: Fear of clouds. I loved the clever intro so I decided to borrow it for this...
by Richard Barrus | May 28, 2010 | ISMS Consulting
Reading Time: < 1 minuteEver need to work on a remote computer which is behind a typical firewall. Well if there is no inbound connectivity, you can play a bit of leap frog using ssh in order to gain access to that server. Here’s a quick example. For this...