Compliance Culture Club: Enter Here

Compliance can overwhelm the best of us — a full slate of regulations and required audits can be hard to handle without a trustworthy partner. To combat this, organizations across sectors are setting their sights on viewing compliance as more than a series of boxes to check. This is a Culture of Compliance: a continuous exercise… Continue reading Compliance Culture Club: Enter Here

Tomorrow’s CISO: Do You Have What It Takes?

Could this be the year of the CISO? Recent studies have high hopes. After all, a rapidly expanding digital world is about more than cyber-defense. With efficacious security measures and new C-suite players taking a seat at the table, a dynamic information security leader is more important than ever. But what traits does tomorrow’s CISO need… Continue reading Tomorrow’s CISO: Do You Have What It Takes?

2024 Cyber Predictions

A man's hand is pressing the switch on the 2024 icon. that shows technology concepts to move towards the new year 2024 and presented the concept of opening a business in 2024

In 2024, cybersecurity is ramping up for unprecedented complexity. As exciting new advancements in technology clash with sinister credible threats, the risks are everywhere —but so are the potential rewards. Let’s examine the longest shadows and brightest horizons as the sun sets on 2023.   1. Malice Matures  Cyber criminals are nothing if not inventive,… Continue reading 2024 Cyber Predictions

Ghost Threat: Managing Non-Employee Risk

You work with them every day, but you’ve never seen their face. You’re not really sure what they do, or if they even count as your coworker. You wonder what they’re getting paid, what their hours are. Do they even have a company login? The working world is ever-expanding, and your organization’s attack surface with… Continue reading Ghost Threat: Managing Non-Employee Risk

Machine Manipulations: Artificial Intelligence in Social Engineering

Your Chief Executive Officer calls you from the road one evening in a time crunch asking you to quickly transfer funds for a company investment she’s brokered while traveling. This is unusual— there are official processes for this. But you’re not going to say no to your CEO or hold her up. You enter the information… Continue reading Machine Manipulations: Artificial Intelligence in Social Engineering

Breach Litigation: I.T. Goes On The Defense

The consequences of major hacks can have far-reaching implications that extend into the physical world and human lives. As headlines abound citing expansive breaches, the general population learns helplessly about their everyday vulnerability, as their data sits in the hands and systems of countless providers and retailers. But now, the blame game is shifting. Victims… Continue reading Breach Litigation: I.T. Goes On The Defense

It’s Only Human: Easing The AI Learning Curve

How might I convince you that I’m human? Or do you suspect I am Artificial Intelligence? I can tell you that I’m working on the introduction to this article, enjoying the sounds of my fingers tapping at the keys. The sky is blue and cloudless outside my window. There’s a mild breeze—just enough to stir… Continue reading It’s Only Human: Easing The AI Learning Curve

The BISO Era Begins: Meet Corporate I.T.’s New Bestie

They’re jacks of business trades, masters of tech translation. They bring high-level technical expertise, solid sense of leadership, and old-fashioned business savvy to the table with a side order of strong interpersonal skills. Meet the BISO (Business Information Security Officer).   What is a BISO? The rise of the Business Information Security Officer comes at… Continue reading The BISO Era Begins: Meet Corporate I.T.’s New Bestie

Ransomware Strikes. Now What?

A SWAT team breaking down doors. Helicopters circling overhead. Hostage situations are serious business, but they don’t always play out like in the movies. What about ransomware response — when the threat is digital, the victim is data, and your organization’s operations hang in the balance? Ransomware is THE cybersecurity headline for 2023 (and 2022… Continue reading Ransomware Strikes. Now What?

The Highly Effective CIO: 5 Dos and Don’ts

After the past few years of global twists and turns, the highly effective CIO of 2023 is ready for anything! With the pandemic largely in the rearview, and big-picture goals dominating the cybersecurity stage in coming months, now is the time to examine your business practices to cultivate sustainable IT security strategies. IT leaders know… Continue reading The Highly Effective CIO: 5 Dos and Don’ts