Blog

November 13, 2016

Why Choose JED Consulting Services LLC? 
•    The HIPAA Security Rule provides the "what" in regard to requirements with which health care organizations must comply, yet we're often asked "how can we implement safeguards that fulfill the intent of the rule?" and "what...

June 22, 2016

What have I done to learn about Information Security over the past quarter of a century.

What do all attacks or exploits have in common? 

How does data move across your network?

Do you have a fundamental of the basic terminology dealing with network types and standards.

I...

June 22, 2016

What do you mean "Mobile Computing" ? A physical device that can move outside the Enterprise's security perimeter.  Device holds or processes Enterprise data. The question is does the Perimeter exist anymore? In the 1990s mobility meant laptops and notebooks. In 2000s...

August 9, 2015

Security Operations

 

The Good, The Bad, and The Profitable: Commercial Threat Intelligence in 2015

 

What are the different types of offerings on the market?

 

Can you discuss inherent problems and contradictions in commercial threat intelligence?

 

Can you reveal the latest...

Please reload

Featured Posts

Why Choose JED Consulting Services LLC? 
•    The HIPAA Security Rule provides the "what" in regard to requirements with which health care organizatio...

Critical Security Controls

November 13, 2016

1/3
Please reload

Recent Posts

June 22, 2016

Please reload

Search By Tags
Please reload

Follow Us
  • Facebook Classic
  • Twitter Classic
  • Google Classic