Current Security Topics from today's Cybersecurity Pros
Articles
Employee Security Awareness Training: Why It’s Important
Sustained investment therefore in Tactical Strategic Relationships with specific IT/Business teams and vendors will help us to act faster and contain the damage from the next generation of cyber attacks.
Zero Trust Architecture: Never Trust, Always Verify
Sustained investment therefore in Tactical Strategic Relationships with specific IT/Business teams and vendors will help us to act faster and contain the damage from the next generation of cyber attacks.
Combat Threats With Supply Chain Security & Risk Management
Sustained investment therefore in Tactical Strategic Relationships with specific IT/Business teams and vendors will help us to act faster and contain the damage from the next generation of cyber attacks.
Relationships in the Cyber Era
Sustained investment therefore in Tactical Strategic Relationships with specific IT/Business teams and vendors will help us to act faster and contain the damage from the next generation of cyber attacks.
The Importance of Vendor Risk Management for CISOs
Working with vendors, even vendors that have the best operational and logistical support, introduces risk into your business: risk of breach, inefficiency, or loss or damage to data.
CISO Blogs
What Is Zero Trust Anyway?
The difference between the success and failure of a data classification program is a lack of action. The purpose of this blog post is to provide you with enough background and understanding to develop a plan. Here is a framework, something to develop into a plan and intelligently pitch to senior management. The following will give you the tools to persuade the required business leaders to implement a successful Data Classification program.
Why Bots Are the Next Big Thing in Account Takeover Fraud
Automated measuring of control effectiveness is a very good idea conceptually. Unfortunately, organisations can’t confidently say their controls are really deployed everywhere they’re expected.
When software reaches EOL, it means that program will no longer be supported by the developer and there will be no more updates. Without updates and bug fixes, this software becomes vulnerable to hackers and cyber criminals.
Ransomware: When Policy Matters Most
As our cyber defense focus has shifted, so has the array of potential solutions. The choices we CISOs make in what we buy, and how, therefore matters. Best of breed may offer capability and expertise unavailable in bundled solutions. As a result, the good enough provided by bundled solutions may not be good enough anymore.
Selling to a CISO? Practice Empathy, Not Salesmanship
As our cyber defense focus has shifted, so has the array of potential solutions. The choices we CISOs make in what we buy, and how, therefore matters. Best of breed may offer capability and expertise unavailable in bundled solutions. As a result, the good enough provided by bundled solutions may not be good enough anymore.
The Risk of Measuring Risk
Automated measuring of control effectiveness is a very good idea conceptually. Unfortunately, organisations can’t confidently say their controls are really deployed everywhere they’re expected.
When software reaches EOL, it means that program will no longer be supported by the developer and there will be no more updates. Without updates and bug fixes, this software becomes vulnerable to hackers and cyber criminals.
SecOps Needs More Democratization, Not Less SOC
An increasing complexity of technologies, as well as an increasing number of failures and attacks followed by an increasing dependency on business goals is changing the way we run Security Operations Centers. While bringing business experts into a SOC function might help security professionals get a better alignment with the business and strategize the SOC, it will not address all the scalability and agility problems inherent in a SOC.