Dwayne Melancon
Security threats and the retail industry
Only 18 percent of retail IT security professionals are concerned that point of sale devices are being targeted by cyber criminals, and only 20 percent are …
Vigilance and the Enterprise of Things
Most enterprises allow BYOD in their environment, with varying levels of supervision. Typically, these are tablets and smartphones but the number of other Internet of Things …
Password security is not just a user problem
When high profile password compromises occur, we often spend a lot of time focusing on advice to the users – “Use strong passwords;” “Don’t reuse …
5 things infosec can learn from adventure games
As an active adventure gamer and a natural seeker of reusable patterns, I’ve noticed that some of the things I do to achieve success in video games can be applied to …
Using Hollywood to improve your security program
I spend a lot of time on airplanes, and end up watching a lot of movies. Some of my favorite movies are adventures, spy stuff, and cunning heist movies. Recently, I realized …
Business risk: Tales from the TrueCrypt
The recent incidents with the Heartbleed OpenSSL vulnerability, along with the strange turn of events involving TrueCrypt shine a light on a big issue for security …
Strategic security acquisitions: What makes sense?
Thanks to a steady stream of high-profile data breaches, a rapidly shifting threat environment, and the recent indictment of 5 members of Chinese People’s Liberation …
Five lessons we can learn from financial services and compliance
Banks and financial services organisations have been a prime target for hackers for a very long time, and as a result of this the industry has had to adhere to security …
Metrics: Valuable security indicator or noise?
Many organizations believe that IT, and by association IT security, is a wasted expense. They recognize that the financial investment needs to be made but few truly understand …