Sayers Blog

Subscribe 
updated_default_header
    July 23, 2019

    Your Password Policy Should Challenge Hackers, Not Your Users

    Any time a human is involved, the potential for weakened security increases.  Password policies are necessary for cybersecurity compliance; however, burdensome password policies can result in bad user behavior like password transformation.

    Read More
    July 03, 2019

    Affordable Cybersecurity Assessment using OWASP

    Sometimes we just need a sanity check and assessments offer that opportunity.  An assessment can offer a glimpse into those things that may require our attention, and ideally, some validation of our good work.  But, they can be potentially expensive.  For a quick self-assessment, there is a ...

    Read More
    February 17, 2019

    Doomsday Docker Software Vulnerability

    The attraction of a DevOps strategy is understandable, but sometimes I feel like the speed of business should be just a bit slower.  

    Read More
    January 28, 2019

    Combatting Uncertainty Around Cloud Security Readiness

    Overall, there is a weak grasp on what "Cloud Security" actually means. 

    Read More
    January 07, 2019

    Life Safety Above All Else

    Years ago, when I sat for my CISSP, I went into the exam carrying two bits of advice offered to me by a mentor:

    Read More
    August 07, 2018

    What Does Citrix Sharefile Have to Do With Harvard?

    The Harvard Business Review conducted a study to understand how successful teams collaborate using file sharing technology.

    Read More