post was originally written by Sandy Carter and published on the AWS Public Sector Blog. According to the 2020 Deloitte-NASCIO Cybersecurity Study for state governments, 54 percent of states are not confident in their ability to protect emerging technology....
“Four years!” As soon as the words left my mouth, I regretted saying them. Not because they were wrong, rather the incredulousness in my voice was instantly met with furrowed brows and folded arms. Across the table was a potential customer, and thanks to my lack of...
In 1919, a man founded a company to sell dubious investments in international postal trading. The company made no profit or tangible product. Despite this, the man sold millions of shares in his company. With each investor, he would funnel the money into dividends to...
Nobody reading your information security policies? Perhaps they are unreadable. There is a hard truth many information security professionals must to face: just because you have the title of Information Security Officer (or similar) does not mean people will read or...
I want to talk to you about a delicate issue we face in IT. No, not the legalization of recreational marijuana, I mean our Gilfoyle Problem. Our Gil…wait, what? Stay with me here, we are going on a Vision Quest. Gilfoyle is a character on the hilarious HBO TV show...
In October 1995, I finally found my calling. What I found was SQL Injection, perhaps the most prevalent web site hack still alive and well twenty years later. However, what I discovered was that my calling is not about hacking websites, but rather hacking humans....