An Eye on IoT Security

An Eye on IoT Security

| | iot, visibility
Ever heard of the “Star Trek” effect? If you show imaginary, cool, futuristic technology in a movie or show, technologists of all ages will do their best to make it come true. When Spock, in Star Trek (1970s), waved his tricorder over strange objects and said, “Hmm…”, or when Marty ... Read More
The Terrible, Horrible, No Good, Very Bad Truth About Vulnerability Management

The Terrible, Horrible, No Good, Very Bad Truth About Vulnerability Management

|
You have a vulnerability management program which is perhaps the cornerstone of your cybersecurity strategy. Your vulnerability scanner runs once a month (or more/less depending on how cybersecurity-mature your organization is). Each time a scan is run, it spits out a mile-long list of vulnerabilities and then you start questioning ... Read More
Winning at Cybersecurity Whac-A-Mole

Winning at Cybersecurity Whac-A-Mole

The dictionary defines a “cliché” as a word of phrase that is overused, but have you ever considered that it gets overused because there is a universally accepted truth about it? Cybersecurity terminology is full of such clichés and a very common one is “whac-a-mole” ... Read More
The Adventures of CISO Ed & Co.

The Adventures of CISO Ed & Co.

If you walk over to the office area where your company’s InfoSec team sits, you are bound to overhear some very interesting conversations. The world of cybersecurity is full of stories, anecdotes, and insights. Some are funny, others are strange, and some are hair-raising! ... Read More
Loading...