A craftsman never blames their tools. It is not the systems that ultimately fail cyber security professionals- it’s the people. Insider threats do abound but more often than malfeasance, misfeasance…
Security
Doctrine In Depth
Going in to budget meetings and telling your leadership to spend money on product development and marketing based on the confidence you have in the business case you’ve made. And not worrying about lo…
An Evolution In Endpoint Security
What must be an absolute result of the workforce shift- endpoint security went from the fifth highest to the second highest spend in the past six months.
IOTW: Twitter Leaves Confidential Information Vulnerable—Again
User information was stored in the browser cache even after logging out of Twitter, leaving email addresses, contact numbers, and the last four digits of credit cards vulnerable.
Top 5 Key Takeaways From Cyber Security Hub In June
The Cyber Security Hub community has safely made it’s way into July. As cyber security is a moving target, we take the opportunity to share perspective on where our collective sites were most recently…
Olympian, Navy Seal and Silicon Valley Investor Lessons Learned
Honor, courage and commitment were the soft skills provided to him from the military. But the culture creates the understanding that “you’re not supposed to even acknowledge what you do.”
Discovering A Brief History Of Cyber Security & Our Latest Inflection Point
How cyber security experts can remember the past, glean new key learnings, apply those insights to today’s plan and benefit the enterprise tomorrow.
4 Cyber Risk Management Imperatives To Accelerate Digital Transformation Recover…
Targeted and accelerated digital transformation initiatives can bring back company stature and relevance by adjusting to reduced budgets, shifting resources to diversify revenues and speeding IT moder…
Identity Access, Endpoint Security & User Productivity
No matter where you currently are on the “return” continuum, some form of accentuated remote work, it seems- it’s here to stay. The days of 30%ish of your workforce remotely accessing your systems som…
IOTW: Hactivist Group Anonymous Leaks Police Department Intel
After a decade of relative inactivity, self-described hactivist group Anonymous takes credit for a 269-gigabyte data dump of police department, fusion center, and law enforcement files. Dubbed BlueLea…