Running WordPress in Docker on Apple Silicon
As you may have noticed if we’ve been connected for a while, I’ve finally gotten back around to getting my long-neglected personal site up and …
CyberSecurity Strategist | Advisor | Evangelist | Consultant | Hands-On Technologist | Human Router
As you may have noticed if we’ve been connected for a while, I’ve finally gotten back around to getting my long-neglected personal site up and …
This article was released as a whitepaper for VeriClouds on May 2, 2020, co-authored with Stan Bounev, CEO at VeriClouds, to address common solutions that …
The following article was written for Secure360.org as part of the information presented in an hour-long presentation I gave in Minneapolis entitled Data, Identity & …
As a senior architect, sales engineer, and consultant out in the field working closely with senior IT security leaders and CISOs, I sometimes run into …
Within the IT industry, when considering data-at-rest (DAR) encryption, you may have noticed recently that security experts seem a little divided on how to leverage …
For years, the use of encryption to protect data-at-rest on computers within the enterprise was solely the responsibility of developers who coded the applications that …
I’ve been sitting on this article and concept for months and have had others ask me about it via email — whether I’ve ever done …
G’day, mates — as they say Down Under, where I happen to be at the moment on a rather large SailPoint engagement. It’s been a …
(This post was originally posted just over a decade ago on April 7, 2013. Technology has come quite a way since then. While it is …
Okay, here’s an article I wasn’t planning on posting, but based on some feedback I received privately via email, I thought I would throw this …