PAM cloud security is different.  Let me explain why

PAM cloud security is different. Let me explain why

The 2020 Verizon Data Breach and Incident Report (DBIR) published in May gives a clear indication of where privileged access management (PAM) security is going these days. And the forecast is for cloudy skies ahead.  That’s because: 77% of cloud breaches are due to compromised credentials Attacks on web applications ... Read More
Least Privilege Cybersecurity for Dummies eBook Cover

EU GDPR two years in: What’s happened so far, and what’s in store for the future?

On May 25th, 2020 EU GDPR was 2 years old and it passed with little noise.  I guess that everyone’s been distracted by other events such as the COVID-19 Pandemic which has put the world on pause for the time being, and that includes EU GDPR. EU GDPR has raised ... Read More
Response to Twitter Incident

The Twitter Hack and the Failure to Protect Privileged Access

Twitter. The biggest social media hack so far, and it could have been much, much worse! We all should be very worried. Could a tweet start a war, change the outcome of an election, cause a riot, or even get people to send money (bitcoin) to unverified BTC wallets? On ... Read More
dotmagazine meets... Joseph Carson: Understanding IoT from a Security Perspective

IAM: The Future of Identities and How We’ll Get There

Identity and Access Management (IAM) is the ability to provision, manage, audit and secure digital identities to facilitate and enable approved, authentic requests or connections to view company data, services, systems, networks, and assets. This applies whether they are located on premise or in the cloud, based on roles and ... Read More
DBIR and cyber awareness

5 Top Takeaways from the Verizon Data Breach Investigations Report 2020

The latest Verizon Data Breach Investigations Report 2020 is now publicly available to download or read online. As one of the industry’s top cyber security reports, the 13th Edition of the Verizon Data Breach Investigations Report (VDBIR) is one of our leading indicators of what causes security incidents and why ... Read More
A password is a memorized secret

5 Most Popular Password Cracking Tools: Protect Your Enterprise

Passwords. How on earth did we get here?  They’ve been around for so many years and yet there’s still so much to be said about them. In most organizations passwords are what make the difference between keeping cyber criminals out—and falling victim to a cyber-attack. And for the multitude of ... Read More
Best Practices and Cyber Security Tips for Working Remotely

Best Practices and Cyber Security Tips for Working Remotely

Given the unusual recent circumstances, many employees around the world are finding themselves in a situation where they must work from home or remotely. I’ve been working remotely for almost 15 years, so I thought it would be great to share some of my experiences, cyber security best practices and ... Read More
CISOs Research Report - Car

The CISO Research Report: CISOs thrive on being Guardians of the Business and maybe even the Galaxy

Is Data the new Oil? Some people maintain that “Data is the new oil”. Tech companies around the world are now ranking among the largest global companies. A number of them have values that exceed some countries’ GDP.  Tesla, some would argue, is a tech company that builds cars. It ... Read More
IT Security Performance impacts the Boardroom

IT Security Performance impacts the Boardroom

Cybersecurity has become a frequently debated risk, and according to the World Economic Report is a top-5 risk to world economies and stability. It’s slightly behind other risks such as natural disasters, failure to mitigate climate change, and extreme weather.  Cybersecurity now impacts almost everyone globally, exposes us to significant ... Read More

Why are security and business goals at odds with each other?

Few jobs are more challenging than that of a CISO. Constantly on call and under intense pressure, they’re not only keeping critical systems running and sensitive data protected, but also working to uphold a rapidly evolving list of regulatory demands. Yet CISOs and their teams do much more than act ... Read More