Featured Posts

The Post-COVID Cloud Boom Report: A Deep Dive

The Post-COVID Cloud Boom Report: A Deep Dive

In this episode of the Security on Cloud Podcast, we’re joined by Dr. Larry Ponemon, the Chairman and Founder of the Ponemon Institute who is also considered by many to be a pioneer in privacy auditing, to talk more in-depth about the findings of our latest report,...

Anitian Wins Nine Global InfoSec Awards at RSA Conference 2022

Anitian Wins Nine Global InfoSec Awards at RSA Conference 2022

Anitian named top cybersecurity company in an astounding nine categories, including Hot Company Security Company of the Year, Most Comprehensive Compliance, and Hot Company Enterprise Security. Link to release via GlobeNewswire.com RSA CONFERENCE, SAN FRANCISCO — June...

Security Advocacy in the Cloud with Jacob Ansari from Schellman

Security Advocacy in the Cloud with Jacob Ansari from Schellman

In this episode, we talk with Jacob Ansari, a Security Advocate at Schellman, who leads the firm's security best practices advocacy. With experience as a CISO and assessor, Jacob develops and leads educational efforts on security practices, emerging threats, and...

All Posts

Qualities of Successful IT Security Leaders

Qualities of Successful IT Security Leaders

What makes a successful IT security leader? Intelligence, experience, integrity? With 20 years of experience working with security people, we have ...
Read More
Surviving the Next Target Breach

Surviving the Next Target Breach

The infamous Target breach continues to provide insights. Leadership changes at Target demonstrate the new demands on IT security leadership. Leaders ...
Read More
The Fatal Flaw in IT Risk Management

The Fatal Flaw in IT Risk Management

The spate of high profile data breaches have, if nothing else, proven that organizations are managing risk poorly. Part of the ...
Read More
Security Analytics Part 3: Selecting the Right Analytics Platform

Security Analytics Part 3: Selecting the Right Analytics Platform

This is the final part of our three-part series on Security Analytics. You can view Part 1 and Part 2 here. In Part 1 and ...
Read More
Security Analytics Part 2: An Innovation Explosion

Security Analytics Part 2: An Innovation Explosion

The Security Analytics market is exploding with innovation. There are a myriad of new technologies and new ideas. In this second ...
Read More
Security Analytics Part 1: The Game is On

Security Analytics Part 1: The Game is On

Security Analytics is an emerging class of technologies that leverages big data and advanced analysis techniques to find attackers and malicious ...
Read More
Heartbleed - What You Need to Know

Heartbleed – What You Need to Know

What you need to know about Heartbleed ...
Read More
Communicating Risk to Executive Leadership - Anitian

Communicating Risk to Executive Leadership

In an age when cybercrime and advanced persistent threats are creating havoc, how does IT security communicate risk to executive leadership? ...
Read More
What the Target Breach Tells Us about the State of Security Programs

What the Target Breach Tells Us about the State of Security Programs

What does the Target breach tell us about the state of information security? That companies large and small are missing the ...
Read More
The Failure of the PCI-DSS?

The Failure of the PCI-DSS?

The Target breach has ignited a firestorm of debate over the efficacy of the PCI-DSS. The problem with the PCI-DSS is ...
Read More
We Are Privacy and Security Hypocrites

We Are Privacy and Security Hypocrites

Whether it is personal, local, national or cyber – we adore security, privacy, and spying in all its forms…until it affects ...
Read More
Hack the chip fab

Is badBIOS for Real?

Is badBIOS a real threat? Maybe not, but the origin of this threat could be a very real problem ...
Read More
So, You Want Management to Listen to You

So, You Want Management to Listen to You

How do you get management to listen to security concerns? The answer is understanding why people listen to anything ...
Read More
Analysis of the New Requirements for PCI 3.0

Analysis of the New Requirements for PCI 3.0

Anitian analyzes the new requirements to the PCI DSS 3.0 ...
Read More
How to Get a Meaningful Security Assessment

How to Get a Meaningful Security Assessment

The curriculum of business schools are filled with case studies of companies that took short cuts to become competitive and accomplished ...
Read More
Windows GUI for nMap - WinMap

Windows GUI for nMap – WinMap

A powerful new GUI for Nmap – WinMap ...
Read More

Slash your costs with Anitian

Gartner Hype Cycle - Anitian

FedRAMP guide