Most enterprises allow BYOD in their environment, with varying levels of supervision.
A lot has been said about multi-factor authentication, and it can add quite a bit of security to a system.
As an active adventure gamer and a natural seeker of reusable patterns, Iíve noticed that some of the things I do to achieve success in video games can be applied to information security.
I spend a lot of time on airplanes, and end up watching a lot of movies.
The recent incidents with the Heartbleed OpenSSL vulnerability, along with the strange turn of events involving TrueCrypt shine a light on a big issue for security practitioners.