AWS Security for Start-ups

AWS Security for Start-ups

With a market share of 33 percent, (1) Amazon Web Services is by far today’s most popular cloud infrastructure service solution, Synergy Research Group data shows. To keep their AWS data secure from cyber vulnerability risks, many companies turn to third-party...
Minimal Viable Information Security

Minimal Viable Information Security

Technology startups are different from going concerns, not least of which is their approach to information security risk. Here are my observations on how cyber risk management evolves in a startup, along with a caveat emptor to potential customers of startups. Risk...
Cyber Security, John Donne and IOT

Cyber Security, John Donne and IOT

Here’s my summary of a cyber security essay by Bruce Schneier, a premier thought leader on security for public consumption.  As a former English major, I’m using a meditation from John Donne as our guide: “No man is an island, entire of itself; every man...

Business-first Cyber Security

Staffed by elite cyber security experts, Telegraph Hill Software offers an approach to business-first security similar to that described here by McKinsey.  But we packaged our security consulting for remote delivery to firms throughout the United States that cannot...
IoT Hygiene

IoT Hygiene

Another thoughtful post by <a href="http://” target=”_blank” rel=”noopener”>Schneier on the recent DDOS attack that caused extensive Internet outages.  The attack made use of consumer IoT devices to attack a DNS service...