Skip to content

John T. Scott

ENTERPRISE CYBER SECURITY & RISK MITIGATION SPECIALIST

  • Home
  • Blog
  • Certifications
  • Experience
  • Resources
  • Consulting Services
    • Virtual CISO Services
    • Risk & Gap Analysis
    • Compliance and Audit Response
    • Threat Management and Risk Mitigation
    • Security Architecture Review
    • Breach Response Management
    • Cloud Security Review
  • Contact

Category: Security

Who’s Fault Is it?

On February 19, 2019 By JTSIn Phishing, SecurityLeave a comment

Recently, a British company sued a former employee over the fact that the employee fell for a Spear Phishing attack aimed at their CEO, that resulted in her sending a nefarious actor almost $250K USD of the companies funds. You can read all the details here. This action represents a significant change in how cyber …

Continue reading Who’s Fault Is it?

Cloudy With a Chance of F.U.D.

On March 2, 2017 By JTSIn Cloud, Computers, Government, Security, TechnologyLeave a comment

TO THE CLOUD! Like a battle cry, ringing across the I.T. landscape, environments large and small are rushing to move their systems to the cloud. It seems like a simple proposition. A no brainer, really. All you have to do is take your various systems that live in your brick-and-mortar data centers, and throw them …

Continue reading Cloudy With a Chance of F.U.D.

Choose a Category:

Architecture Cloud Computers General Government Phishing Rants Science Security Space Sports Technology

Search here…

Translate this website:

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 20 other followers

Follow me on Twitter

My Tweets

Past Blog Posts

  • February 2019 (1)
  • January 2019 (1)
  • March 2017 (1)
  • March 2011 (2)
  • September 2010 (1)
  • August 2010 (1)
  • May 2010 (1)
  • February 2010 (6)

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 20 other followers

  • Home
  • Blog
  • Certifications
  • Experience
  • Resources
  • Consulting Services
    • Virtual CISO Services
    • Risk & Gap Analysis
    • Compliance and Audit Response
    • Threat Management and Risk Mitigation
    • Security Architecture Review
    • Breach Response Management
    • Cloud Security Review
  • Contact
Follow John T. Scott on WordPress.com

Follow Me

  • Twitter
  • LinkedIn
Create a website or blog at WordPress.com
Cancel