Risk Management 5 Reasons You Should Use Cyber Risk Quantification in 2023 Does your organization have too much money for cybersecurity? Are you over-flowing with cybersecurity resources? Literally, you don't need anything else?
cybercrime Interactive Question: Battling Ransomware 2021 was a record breaking year for #ransomware and 2022 looks to be worse. Bad actors are emboldened and it is scary! Cybersecurity and guarding against ransomware is everyone’s responsibility as bad actors to not delineate whom or how they compromise their targets, only that that get in and
cybercrime What is doxing and how to protect yourself Doxing can occur to anybody– here’s how you can lower the chances that your individual info will be weaponized versus you How damaging can it be to have your social networks accounts set to public? Or to tag the dining establishment where you’re having that scrumptious meal? Practically
cybercrime How to take control over your digital legacy Do you have a plan for what will happen to your digital self when you pass away? Here’s how to put your digital affairs in order on Facebook, Google, Twitter and other major online services. There’s no easy way to put it: We’re all going to die.
cybersecurity 9 Tips For a Stronger Zero Trust Posture Zero trust is a term that is being thrown around a lot in the security industry and has gained a great deal of traction in recent years.
Incident Response Incident Response Planning Is An Effective Way To Reduce Risk Having an effective incident response plan is crucial to mitigating the damages of an attack and getting your business back up and running as quickly as possible.
Cyber Insurance Cyber Insurance Is Important: Why Being Unprepared Can Cost You Dearly Did you know that 59 percent of businesses don’t have cyber insurance? That’s a startling statistic, especially considering the number of data breaches.
cybercrime How to stay safe from cybercriminals and avoid data breaches A data breach is any person’s nightmare. It can affect you mentally and financially, and an 100% unhackable device or account necessitates taking precautionary measures. Hackers target small and medium businesses as they don’t have the resources to pay for cybersecurity tools and network upgrades to protect their
cybersecurity How CISOs Can Pitch ZTNA to Their Board and Leadership and Get a Yes, Every Time CISOs are always looking for ways to improve their business’s cybersecurity posture. Especially as the cybersecurity landscape continues to shift.
cybersecurity 5 Powerful Tips for Securing Cloud Infrastructure and Data Cloud security is becoming a top priority for many organizations. While the cloud offers many benefits, it also introduces additional security risks.
Cybersecurity Leadership How An Identity Platform Drives Real Business Value in Thwarting Cyber Threats A trustworthy cloud-based identity platform like SailPoint can drive real value to an organization and help ensure a safe and secure environment to transact business.
cybercrime Interview with Enric Cuixeres Saez, the CIO for Leng-d'Or Here’s is my thought provoking interview with special guest. Enric Cuixeres Saez, the CIO for Leng-d’Or, a 55-year old multinational company based in Spain and the world’s leading manufacturer of snack pellets for third parties. In the interview Enric talks about Leng-dOr’s security journey and his
cybercrime Protecting Our Children and Their Privacy is Critical Our Child’s Privacy Is At Risk Cybersecurity is more than stopping malware, ransomware and breaches and impacts so many across the globe including seniors, children and those at risk! I am a seasoned cybersecurity professional and thought leader with three daughters and it scares me. In a crazy and
cybercrime Zero Trust Rising Zero Trust is being counted on more than ever for cybersecurity and now the NSA has issued Zero Trust guidance for Department of Defense (“DOD”) to protect their critical networks and data. However, it is not only for highly secretive environments like NSA and DOD, but also a great idea
Zero Trust Zero Trust is a Strong Security Strategy Zero Trust is not a tool or a security solution. It’s a strategy that is effective against ransomware, breaches and insider threats.
cybersecurity Recognizing The "Women of Cyber" We will be recognizing the amazing #WomeninCyber. More progress in diversity is needed now! Please help support their efforts.
Public Sector 7 Reasons People Matter in Cybersecurity People are an essential element in cybersecurity. If properly trained, positioned and prepared can have a very positive impact on an organization’s security posture.
cybercrime Insider Threat is Real & Growing Rapidly There are many reasons and scenarios that describe the potential risk of insider threats, but it is the latest research from Forrester shown in the video that truly describes the growing concern. Expect to see additional focus on insider threats by CISOs throughout 2021 and into the future. It is
cybercrime A Security-first Mindset In Your Organization Is Critical It is so critical to create a security-first mindset in your organization. Too many organizations treat security as something they must tolerate or work around. Out in the field, For example, I have heard several executives say that they can’t implement a simple and standard security policy because the
cybercrime Ransomware Gangs Are Targeting Executives In the field, we are seeing a great deal of extortion, as a backup to the ransom not being paid by organizations hit by ransomware. Once they have the proper access internally, they are often able to pipe out some of the data before encrypting, thereby giving them a backup
cybercrime Remote work is becoming more permanent in 2021, and cybersecurity must adapt to it! The pandemic has changed our society and how we work and learn. Now remote work, remote learning and telehealth are critical for most businesses. But, the bad actors recognize this and are trying to take advantage of these remote efforts. So, cybersecurity postures must adapt and account for these remote
cybercrime Video Interview with Verizon's Bob Carver - Top 5 Challenges of Securing The Remote Workplace Take a look at my interesting Interview with Bob Carver, CISM, CISSP, Principle, Cybersecurity Threat Intelligence and Analytics at Verizon. Bob addresses the top 5 challenges of securing remote workplaces, including home routers, Wi-Fi, and #VPN providers, and the #vulnerabilities that have surfaced as a result of the precipitous rise