About

Get to the point….what is a Security Taco good for?

As a Chief Information Security Officer (CISO), Chief Information Officer (CIO), Chief Technology Officer (CTO), (or the rest of us) where do you turn for the latest news and analysis to make the best decisions possible?  Security Taco exists to provide the latest news, analysis, and strategy so that you can be informed and be prepared to take action to safeguard your information.

What’s with the name Security Taco?

There are hundreds if not thousands of different ways to make a taco.  Whether you choose a fish taco with tomatoes, or a beef taco hold the cheese, your taco is unique to your tastes and your situation.  It takes many ingredients to make a good taco.  Similarly, every security situation is different, but there are many similarities.  The Security Taco analogy helps to roll (no pun intended) both the common and the unique elements of security into a tasty treat that will help you to increase your personal and organizational security posture.  True security needs many ingredients to be effective.

Who are the Authors?

The main author has nearly 20 year experience in the Information Technology field, with a heavy emphasis on security.  He is also a current Certified Information Systems Security Profession (CISSP), and holds multiple Cisco certifications (CCNA, etc.).  When not writing for Security Taco, he enjoys spending time with his children and traveling.