Candice WoldISMS as a Solution to the Internet of ThingsThe Internet of Things (IoT) landscape has brought forth an array of issues. Problems vary so much that it is hard to maintain focus on…Aug 9, 2017Aug 9, 2017
Candice WoldRSAC 2017 — Days 3 & 4With RSA week in full swing, it’s easy for security buffs to find a discussion on whatever topic suits their fancy — even esteemed…Aug 9, 2017Aug 9, 2017
Candice WoldRSAC 2017 — Day 2Tuesday I had the chance to explore the Expo Room and I can safely say that Valentine’s Day candy is the clear trend for swag this year…Aug 9, 2017Aug 9, 2017
Candice WoldRSAC 2017The phrase “data is the new currency” could be heard echoing the walls at the first day of RSA Conference 2017. Listening to presentations…Aug 9, 2017Aug 9, 2017
Candice WoldComprehensive Information Security Management DocumentationA comprehensive process and procedural documentation package is a strong component of every good information security management system…Aug 9, 2017Aug 9, 2017
Candice WoldBYOD — Personal Mobile Devices in the WorkplacePersonal mobile devices present unique challenges in the modern workplace. Many companies work very hard to secure their networks from…Aug 9, 2017Aug 9, 2017
Candice WoldA Memo to Cloud Service Providers: Why You Should Consider FedRAMPWritten in collaboration with Travis Hyde, Founder & Chief Strategy Officer of Orange ParachuteAug 9, 2017Aug 9, 2017
Candice WoldReality of ComplianceThe word “compliance” can unquestionably put some people on alert, especially those who have had negative experiences with compliance…Aug 9, 2017Aug 9, 2017
Candice WoldCulture of ComplianceI recently heard the phrase “compliance isn’t security” from one of my information security colleagues. If Compliance isn’t security, what…Aug 9, 2017Aug 9, 2017