Ted Demopoulos    Demopoulos Associates
keynote speeches
Security, IT, Business Consulting
securITy newsletter

Subscribe to S e c u r IT y, our free E-newsletter on Information Technology, Security, and their intersection with Business.

Subscribing will not result in more spam! We guarantee it.
(Note: We respect your privacy. We do not rent, sell, or share email addresses.)

Upcoming issues will include interviews with Security Researchers and Executives on what is and isn't working, reporting on industry trends and analysis, as well as editorials on important and timely issues. Also see our Articles page for more material as well as updates on prior newsletter topics.

Selected Previous Issues:

Effective Security Awareness Programs are like Exercise

The 3 Biggest Challenges with Cyber Security Today

Employee Monitoring: The Visible Employee

Security Policy and Wireless and Blogs, Oh My!

User Phishing Awareness Survey Results

Protect Your Laptop from Theft

Comparing Security Certifications: CISSP, GSEC and more

Worst Practices in Developing Secure Software, Part II

Worst Practices in Developing Secure Software, Part I

Avoiding “Worst Practices,” or praying at “The Temple of Best Practices”

The Three changes needed to make the Internet safe

Why doesn't IT get along with everyone else? - and how to fix this

© Copyright 2002-2018, Demopoulos Associates