Mary K. Pratt

Contributing writer

Mary K. Pratt is a freelance writer based in Massachusetts.

Raytheon’s John DeSimone on building the offensive line

12 steps to building a top-notch vulnerability management program

12 steps to building a top-notch vulnerability management program

Security experts share their best advice for the essential ingredients of a solid vulnerability management program, including foundational elements to put in place, workflows to establish, who to involve, and metrics to track.

Equifax’s Jamil Farshchi: Security shouldn’t be a trade secret

Equifax’s Jamil Farshchi: Security shouldn’t be a trade secret

Farshchi joined the credit reporting agency in 2018 with a mandate for change following the company’s high-profile data breach. Today, he’s calling for greater transparency and collaboration in the security community, with Equifax...

Security leaders chart new post-CISO career paths

Security leaders chart new post-CISO career paths

The evolution and growing prominence of the CISO role gives holders more options on where to go next in their careers.

Is your security organization ripe for a reorg?

Is your security organization ripe for a reorg?

CISOs should revisit organizational structure as part of their overall strategic plans and after big shifts in enterprise needs. But experts warn that reorganizing alone isn’t a recipe for success.

Who is your biggest insider threat?

Who is your biggest insider threat?

Phishing simulations aren't enough for identifying your organization’s most vulnerable insiders or minimizing their risk.

MassMutual’s Ariel Weintraub on bringing more intelligence to security

MassMutual’s Ariel Weintraub on bringing more intelligence to security

For the insurance company CISO, a do-it-yourself approach to security analytics and SOC staffing, pays off in increased agility and quicker responses to threats.

VMware’s Karen Worstell: This isn’t a black swan world anymore

VMware’s Karen Worstell: This isn’t a black swan world anymore

Over the past 30 years, several disruptive events have completely changed the practice of security. The challenge for CISOs: take the lessons of the past and apply them to the future.

How WiCyS is taking on security’s image problem

How WiCyS is taking on security’s image problem

Since 2012, Women in Cybersecurity has been breaking down barriers by building a community focused on recruiting, retaining, and advancing women.

6 steps to getting risk acceptance right

6 steps to getting risk acceptance right

Understanding your organization’s risk tolerance is vital for informing cybersecurity strategy. Here’s how to ensure a risk-driven security agenda.

8 keys to more effective vulnerability management

8 keys to more effective vulnerability management

Wherever you are on your journey toward building vulnerability management program, these best practices will help you be more efficient and effective.

Shifting security left at WGU

Shifting security left at WGU

“We have better security success when the developers are taking part in it,” says James Chandler, VP of security for Western Governors University.

Load More