In some cases, using production data for testing is unavoidable. When such a situation arises, what controls should be applied to the data to keep it secure?
Inherent weaknesses in penetration tests and why you should not rely only on them for security.
My opinion on Yahoo’s decision to disallow working from home and having everyone come into the office.
Hashing or encryption – which method should you use to store passwords?
Ten information technology principles that every organization should abide by.