Open source alternatives

– By: Dr. Gene Lloyd – A lot of organizations shy away from open source software because they have a perception that it may be unsecure, incomplete, or not have any real backend support to fix user problems. Some of…

Security Policy Review Timelines

– By: Dr. Gene Lloyd – How often do you review your network security policies? How often do you look through the details of these policies and update the content to reflect the current state of the organizations and the…

BYOD is a Bad Idea

– By: Dr. Gene Lloyd – The bring your own device (BYOD) idea that became popular a few years ago is one that I have always thought to be a bad idea and would never suggest that a company or…

Oversight for positions with trusted access

– By: Dr. Gene Lloyd – How do you effectively manage employees in technical positions that have the ability to destroy your company with a few strokes of a keyboard? Have you ever wondered about the disastrous effects a disgruntled…

The Art of Security Policies

– By: Dr. Gene Lloyd – Have you ever noticed how security policies tend to be long and complex? These policies are typically required reading by new employees, but many of them just sign it without reading because it is…