Most Recent Blogs

Commuting Chelsea Manning’s Sentence Was Just and Proper

Posted: January 26, 2017   /   By: Jon Oltsik   /   Tags: Cybersecurity, DoD, POTUS, Chelsea Manning, US Army

White_House.jpgBefore leaving office, President Barack Obama commuted the sentence of former Army soldier Chelsea (Bradley) Manning. At the time, Manning was serving a sentence of 35 years for leaking classified material to WikiLeaks in 2010. This material was subsequently published by WikiLeaks, embarrassing the US government and exposing several previously undocumented war crimes that took place in Afghanistan and Iraq.  

The President’s decision to commute Manning’s sentence was extremely controversial. The verdict was made over the objection of Secretary of Defense Ashton Carter, while other military and government officials quickly criticized Obama’s pronouncement.  Just today, President Trump referred to Manning as an “ungrateful traitor” who should have never been released from prison on Twitter.

Read More

The Highs and Lows of Cybersecurity Integration

Posted: May 29, 2015   /   By: Jon Oltsik   /   Tags: Information Security, Cybersecurity, DHS, FIDO, DoD

digital_lockBased upon anecdotal evidence, I estimate that the average large enterprise organization uses more than 70 different security tools from an assortment of vendors. As they say in Texas, “that dog don’t hunt.” In other words, it’s nearly impossible to maintain strong security hygiene or establish best practices when the security organization is chasing cybersecurity optimization on a tool-by-tool basis.

Read More

RSA Security Conference 2013: The Most Important RSA Ever?

Posted: February 22, 2013   /   By: Jon Oltsik   /   Tags: Apple, Information and Risk Management, Security and Privacy, Security, Mandiant, rsa conference, cybercrime, Facebook, Barack Obama, DoD

It wasn’t long ago that the annual RSA Security Conference was an oasis from mainstream IT. While CIOs were focused on business process automation, the RSA crowd was celebrating technologies like DLP, web security, and key management. Yup, security was an under-funded IT stepchild and the RSA Conference was still centered on bits and bytes.

That was then, this is now and cybersecurity is everywhere – newspapers, magazines, television news, etc. Off the top of my head, here are some of the big cybersecurity news stories from the first two months of 2013:

Read More

More On The Security Skills Shortage Issue

Posted: June 21, 2012   /   By: Jon Oltsik   /   Tags: Information Security, Cloud Computing, Network Security, Cybersecurity, End-User Computing, Endpoint & Application Virtualization, IT Infrastructure, Private Cloud Infrastructure, Networking, Information and Risk Management, mobile, Security and Privacy, BYOD, endpoint security, DHS, Symantec, federal government, nsa, security analytics, DoD, security skills, cloud security

I frequently peruse information security news, and recently came across this article. The article highlights Symantec CEO Enrique Salem's warning of a shortage of talented cybersecurity professionals in the United States. Furthermore, this shortage is especially pronounced where it may be needed most -- law enforcement, intelligence agencies, and the Department of Defense.

Read More

Posts by Topic

see all