Mary K. Pratt

Contributing writer

Mary K. Pratt is a freelance writer based in Massachusetts.

Know thy enemy: thinking like a hacker can boost cybersecurity strategy

How to prepare for a SOC 2 audit – it’s a big deal, so you’d better get ready

How to prepare for a SOC 2 audit – it’s a big deal, so you’d better get ready

Getting ready for one of the most demanding review processes in cybersecurity can be daunting, but experts say preparing for a SOC 2 audit can be an important part of a well-managed year-round security program.

8 hallmarks of a proactive security strategy

8 hallmarks of a proactive security strategy

More CISOs are balancing their response and recovery capabilities with proactive measures that anticipate attacks and vulnerabilities.

How legacy tech impedes zero trust and what to do about it

How legacy tech impedes zero trust and what to do about it

Old perimeter-based defenses can throw up roadblocks to implementing a zero-trust strategy, but a measured, phased approach will see you through.

Collaboration is key to balance customer experience with security, privacy

Collaboration is key to balance customer experience with security, privacy

Security and privacy teams working with sales, marketing and design ensures a good user experience while protecting data and maintaining regulatory compliance.

4 strategy game-changers for finding cybersecurity talent

4 strategy game-changers for finding cybersecurity talent

Some CISOs are shaking up their staffing plans to address the challenges of recruiting, hiring and retaining cybersecurity workers – and finding success in their moves.

How Carrier’s product security team delivers the ‘right support for the right product’

How Carrier’s product security team delivers the ‘right support for the right product’

Carrier CPSO John Deskurakis developed a framework for product security that works for the lifecycle of all products across all business lines

7 critical steps for successful security onboarding

7 critical steps for successful security onboarding

Creating a culture of security starts on day one, say veteran security leaders. Here’s their advice for making that initial security training more effective.

How ABM built a cohesive security program around zero trust

How ABM built a cohesive security program around zero trust

CISO Stephanie Franklin-Thomas advances ABM’s security program with a holistic approach to zero trust, putting equal emphasis on people, process, and technology.

How OKRs keep security programs on track

How OKRs keep security programs on track

This goal-setting framework can help security teams stay focused on priorities, but success requires a commitment to implementing supporting practices.

MITRE Engage: a framework for deception

MITRE Engage: a framework for deception

The new framework helps security teams understand their adversaries by creating engagement opportunities that keep defenders in control, says MITRE CISO Bill Hill.

6 security analyst job description red flags that make hiring harder

6 security analyst job description red flags that make hiring harder

With security professionals in short supply, it pays to ensure your job postings aren’t turning away good candidates. Here are six things experts say to avoid and what to do instead.

Load More