Setting The Four Cornerstones Of Cloud Security: Accountability, Strategy, Visibility & Enablement

We talk about ‘data breaches’ because of regulatory and statutory definitions that focus on the disclosure of data. An organization’s security strategy should work with the end in mind, and focus heavily on denying threat actors access to those data with the highest regulatory, statutory, or contractual risks.

The Resilience of Humanity

“Multi-factor authentication and passwordless technologies help to protect our digital identities and account credentials from theft or impersonation. This matters just as much to an individual using a hardware key to access their online bank as it does for a corporate employee using facial recognition to access a privileged administrative account.”

– Kayne McGladrey, IEEE Senior Member

Opening keynote speech at the Seattle Electrical Conference

“I hope that you want to create safe products that benefit individuals and society, that make life better.

That you want to reverse course, and can advocate for security in face of lean IT, DevOps, and less money and less time and less people.

IEEE code of ethics includes the phrase “disclose promptly factors that might endanger the public or the environment”.

Not as strong as language as the other code of ethics I’m bound to follow as a CISSP, to “protect society, the common good, necessary public trust and confidence, and the infrastructure”

Regardless of which code of ethics you’re following, we have responsibility to society to turn this around.”