Mitigating insider threats from a people perspective

Mitigating insider threats from a people perspective

Mitigating insider threats is an ongoing effort that requires a holistic approach that encompasses technological as well as human solutions. Additionally, organizational and situational factors can help mitigate the threat posed by...

Cyber threats come from all angles at the financial services industry

Cyber threats come from all angles at the financial services industry

Reputational loss and reduction in customer confidence can severely impact the long-term well-being of a financial institution ill prepared for the threats that they face. Each organization must develop a strategy that finds the right...

Security can be a competitive differentiator

Security can be a competitive differentiator

Organizations that are able to demonstrate that they have cyber security strategies in place to include incident and contingency planning position themselves ahead of competitors that are in the process of developing them or have yet...

How to keep your highly skilled and paid security team happy and engaged

How to keep your highly skilled and paid security team happy and engaged

Employees contribute significantly to an organization’s achievements and a cyber security team is no different. Its value can be measured by the reduced number of security incidents and the speed and efficiency with which those...

CISOs must quickly adapt to any situation

CISOs must quickly adapt to any situation

Today’s CISO is in the unique position of becoming an important conduit between the C-Suite and the operators that keep an organization running. The position is a pivotal spoke in a large wheel having visibility and influence in...

Retaining security talent by embracing distributed team management

Retaining security talent by embracing distributed team management

Ask anyone in a security leadership role about their team and you’ll likely find that the great majority are struggling. They are struggling because finding security talent is increasingly hard and keeping that talent is even harder....

How to convince the CFO of the budgetary security need

How to convince the CFO of the budgetary security need

It had been custom for organizations to think of cyber security in terms of an information technology (IT) problem best left to IT people to address and fix. However, as more prolific breaches were publicized exposing a variety of...

5 sins cybersecurity executives should avoid

5 sins cybersecurity executives should avoid

With the advent of 2016, I was tempted to touch upon my thoughts on what the future of the cyber landscape will hold, prognosticating trends and shifts and what the next big threat would be. However, upon deeper reflection and...

Thinking outside the product box

Thinking outside the product box

The dynamic nature of the cyber threat landscape guarantees that the threats and the actors behind them are always evolving, increasing in sophistication in order to circumvent the most robust security devices. As such, our cyber...

The technocracy is over – innovation is here, plan your security accordingly

The technocracy is over – innovation is here, plan your security accordingly

Information technology (IT) is going through an age of “technocracy” decline. Innovations in the IT sector have made way for various platforms that can be leveraged to support employees’ workflows and processes. As a result,...

Tighten up your cyber security strategies now

Tighten up your cyber security strategies now

While there are many security offerings to help an organization better protect itself from the onslaught of cyber threats knocking on its perimeter, no one solution is enough to reduce risk in this dynamic landscape. Each individual...

Cyber security culture is a collective effort

Cyber security culture is a collective effort

Many believe that cyber security culture starts from the top and works its way down. While there is merit to this statement, I would argue that all stakeholders in the ecosystem create cultures collectively.

Social media can quickly take down your business if not monitored

Social media can quickly take down your business if not monitored

Not having a plan in place to protect your brand risks losing public trust and confidence that build long lasting relationships. Trying to restore them can be an arduous undertaking. And a costly one.

Security and the Internet of Things – are we repeating history?

Security and the Internet of Things – are we repeating history?

The Internet of Things (IoT) refers to the networking of endpoint products and objects that can be accessed via the Internet. The objective of this level of networking is to make our every day experiences more streamlined and...

Number 3 on my top 10 list for security executives: Focus

Number 3 on my top 10 list for security executives: Focus

The threat landscape has evolved. Security solutions have evolved. Has your focus?

Number 2 on my top 10 list for security executives: Reform

There are a number of reforms that can be used to act as a carrot instead of a stick. Reform need not be regulatory mandates that are operationalized as reports used for placating auditors. Examples of ways the federal government can...

Number 1 on my top 10 list for security executives: History’s lessons

Number 1 on my top 10 list for security executives: History’s lessons

History has given us a wealth of stories from which analogies related to information security can be drawn. Some of these stories significantly predate the digital age but are relevant because they can impress upon us the significance...

Top 10 threats, trends and business priorities for security executives

Some of the most critical issues concerning security executives as they relate to internal and external threats, trends in IT such as BYOD and cloud, and the alignment of security strategies with business priorities

Phishing, football and frauds: 15 ways to safeguard yourself during the World Cup

The 2014 FIFA World Cup in Brazil promises amazing football, frantic fans around the globe, and a playground for fraudsters

Let's say goodbye to passwords

Over the last few years I’ve been conducting unofficial surveys of security analysts and security executives I meet in the field. My goal is always to determine what security solutions have been most detrimental to actually achieving...

Load More
Top Blog Posts