Mary K. Pratt

Contributing writer

Mary K. Pratt is a freelance writer based in Massachusetts.

When and how to report a breach to the SEC

What is zero trust? A model for more effective security

What is zero trust? A model for more effective security

As the security model becomes the preferred security strategy, it’s worth looking at what it is and what it takes to achieve.

Economic pressures are increasing cybersecurity risks; a recession would amp them up more

Economic pressures are increasing cybersecurity risks; a recession would amp them up more

Insider threats and the rate of successful attacks coupled with corporate cost-cutting efforts have historically hurt cybersecurity programs — and would likely do so again.

Will your incident response team fight or freeze when a cyberattack hits?

Will your incident response team fight or freeze when a cyberattack hits?

CISOs train their teams to fight hackers but often overlook the human tendency to freeze up during a crisis. Planning for the psychology of incident response can help prevent a team from seizing up at the wrong moment.

Veterans bring high-value, real-life experience as potential cybersecurity employees

Veterans bring high-value, real-life experience as potential cybersecurity employees

Veterans come with a range of hard and soft skills acquired during their military service that often dovetail perfectly into a career in cybersecurity.

What you should know when considering cyber insurance in 2023

What you should know when considering cyber insurance in 2023

When even the best-laid cybersecurity plans fail, cyber insurance can help mitigate an organization’s exposure to financial and operational risk—but the insurance landscape is shifting with the times.

Know thy enemy: thinking like a hacker can boost cybersecurity strategy

Know thy enemy: thinking like a hacker can boost cybersecurity strategy

Putting on a red hat and trying to understand the motivations, expectations, behaviors, and goals of bad actors can be a key part of a solid cybersecurity plan.

How to prepare for a SOC 2 audit – it’s a big deal, so you’d better get ready

How to prepare for a SOC 2 audit – it’s a big deal, so you’d better get ready

Getting ready for one of the most demanding review processes in cybersecurity can be daunting, but experts say preparing for a SOC 2 audit can be an important part of a well-managed year-round security program.

8 hallmarks of a proactive security strategy

8 hallmarks of a proactive security strategy

More CISOs are balancing their response and recovery capabilities with proactive measures that anticipate attacks and vulnerabilities.

How legacy tech impedes zero trust and what to do about it

How legacy tech impedes zero trust and what to do about it

Old perimeter-based defenses can throw up roadblocks to implementing a zero-trust strategy, but a measured, phased approach will see you through.

Collaboration is key to balance customer experience with security, privacy

Collaboration is key to balance customer experience with security, privacy

Security and privacy teams working with sales, marketing and design ensures a good user experience while protecting data and maintaining regulatory compliance.

4 strategy game-changers for finding cybersecurity talent

4 strategy game-changers for finding cybersecurity talent

Some CISOs are shaking up their staffing plans to address the challenges of recruiting, hiring and retaining cybersecurity workers – and finding success in their moves.

Load More