Gray Beard Blog

Random Thoughts....

catscan-test-scenerios

2 min read

Woof Woof security policy

I was asked to write a basic information security policy for my veterinarian office who is concerned about basic business hygiene came out pretty good... so I am sharing here for all those that help keep our pets healthy.. Version 1.0 – WoofWoof...

Read More

2 min read

Blog Archives

Okta is a powerful identity and access management platform, but like any complex system, its effectiveness depends heavily on how it's configured....

Read More

1 min read

SWOT IS A SIMPLE YET POWERFUL TOOL TO ASSESS YOUR BUSINESS OR PROJECT'S STRENGTHS, WEAKNESSES, OPPORTUNITIES, AND THREATS

In looking across the 2023 business reviews we have seen some strenths and some common weaknesses such as 1. Strengths Advanced IT Infrastructure:...

Read More

1 min read

How to test api security

Conducting an API security assessment involves several steps to identify potential security vulnerabilities, bugs, and flaws in the API code. The...

Read More

1 min read

GLBA for CPa and accountants

The Gramm-Leach-Bliley Act (GLBA) is a federal law that requires financial institutions, including accounting and CPA businesses, to protect the...

Read More

5 min read

Security Compliance: Understanding the Difference Between Security Vs. Compliance

Throughout my career, I’ve listened to and participated in the debate or discussion surrounding security vs compliance. Most often it seems that...

Read More

4 min read

The Cybersecurity Triangle: People, Process, and Technology — And Why Pizza Is Round, Packed in a Square Box, and Eaten as Triangles

In the world of cybersecurity, there are three core pillars that every organization should be focusing on: people, process, and technology. These...

Read More

1 min read

Blog Archives

On June 6th President Donald J. Trump signed an Executive Order to strengthen the nation’s cybersecurity by focusing on critical protections against...

Read More

1 min read

Finding needles in a haystack

I recently did a interview on the Reimagining Cyber Podcast about advancements in the software security industry. I then took some time to think...

Read More

2 min read

Running an Effective Cybersecurity User Education Program for a 1000-Employee Business

In today’s hyper-connected world, businesses of all sizes are exposed to a wide array of cybersecurity threats. For a company with 1000 employees,...

Read More