Security Policy Exceptions

Not long ago, I was reading a debate on a Linkedin.com forum discussing all kinds of edge cases that some participants were arguing needed to be considered in a security policy regarding some particular aspect of security.  In fact, I forget what the issue was, but it was clear that… Continue reading

Skype in the Enterprise

The following excerpt is a thread from a discussion on Linkedin in the Information Security Community group. This discussion was the impetus for my article Is Skype Secure?  which includes an assessment of Skype Security Risks and an assessment methodology. Question: Anybody using Skype yet at an enterprise level? If so,… Continue reading