Michael DundasKeeping Secrets: WannaCry and the Encryption debateMost people will naturally assume that the encryption debate where law enforcement wants to ensure that a technical method only for their…May 15, 2017May 15, 2017
Michael DundasSecurity policy is still legacy, yet next generation security devices are common placeMany organizations still implement security policies in legacy format where a policy contains a set of IP Addresses and ports that define…Feb 26, 2017Feb 26, 2017
Michael DundasIdentity and Access Management: The product is not the first stepIf you are an executive team or sit on a board, you need to ask the question of your security staff “What is the potential (on a scale of…Aug 1, 2016Aug 1, 2016
Michael DundasWhy measurement will become even more important in SecurityMeasurement when it comes to security and the executive often comes in the form of KRIs (Key Risk Indicators). These are typically…Jul 24, 2016Jul 24, 2016
Michael DundasRespect and ObedienceWith all the interaction between governments, law enforcement and civilians lately, we all see many comments, blog posts, news articles and…Jul 10, 2016Jul 10, 2016
Michael DundasAre you really more secure if your infrastructure is not in the cloud?In my opinion that answer is ‘it depends’. As a senior executive, if you were to ask your I.T. or security department if they could…May 20, 2016May 20, 2016
Michael DundasA “serverless” bot in the cloudUsing Slack and AWS Lambda and CloudWatch, I wrote a very simple bot. Beyond basic scripting, I have not coded much since school, and when…Apr 24, 2016Apr 24, 2016
Michael DundasI never drink the Kool-AidA few weeks ago, I was approached by a vendor who had heard I was potentially looking for new opportunities. They wanted to have a…Jan 16, 2016Jan 16, 2016
Michael DundasWhere Instant Messaging Clients are HeadingLike many of us, instant messaging clients have been a staple for years. For me it was IRC and ICQ, followed by MSN, Yahoo, Jabber, and I…Dec 7, 2015Dec 7, 2015