Top IT security certifications for critical infrastructure — by sector

Top IT security certifications for critical infrastructure — by sector

With the rising need for skilled cybersecurity professionals across all 16 critical infrastructures, here's an easy reference to infrastructure-specific certifications in cybersecurity. This is based on conversations with...

Back to school, part 2: no whaling allowed!

Back to school, part 2: no whaling allowed!

5 security safeguards to keep the CEO out of hot water.

What I learned about risk on my summer vacation

What I learned about risk on my summer vacation

10 homework assignments CSOs can give their teams to keep their bosses safe (and stay out of the principal's office!)

Keep the change: 9 steps to adapting to IT security

Keep the change: 9 steps to adapting to IT security

Changing the way we look at "security" could make the difference in how successful we are. Here's a step-by-step process CSOs and their teams can implement to integrate any type of GRC or Infrastructure Security change initiative into...

Keeping security (and alerts) in context

Keeping security (and alerts) in context

Complexity is the primary security problem, demonstrated by the degree to which misconfiguration and misalignment of protection are leveraged in cyber attacks. One way to change the game is via context. We need to know more about 1)...

How to gain the trust of the board

How to gain the trust of the board

One of the keys that can make a good CSO presentation a great one is by ensuring the data being reported actually has relevance on specific business risks the organization is most likely to encounter (rather than assembling a...

How to present security to the board

How to present security to the board

Part of the DNA of any CEO is in how well he or she can deliver quarterly reports (good and bad) to a Board of Directors, with the usual flair of just enough excitement to keep everybody upstairs interested, all the while keeping them...

It’s hunting season but who’s the prey?

It’s hunting season but who’s the prey?

There’s a trend in security operations to work to close the gap between discovering a breach after the damage has been inflicted, and delving deeper into the infrastructure to evaluate the “What/Where/When/How” in an effort to advance...

How to make mergers and acquistions work

How to make mergers and acquistions work

When tech companies "Merge and Purge" their IP, organizations on both sides of the trades can get nervous. Here's one recent deal that could actually mean a better set of solutions for everybody concerned.

Black Hat basics: Ruminations on 19 years of Black Hat Briefings

Black Hat basics: Ruminations on 19 years of Black Hat Briefings

As this is my first venture into the world of blogs for CSO, the timing coincides with one of my favorite summer activities—traveling each August to the American desert, to roast in the Nevada sun, and attend the Black Hat Briefings....

Top Blog Posts