Is Security Job #1? by Richard Stiennon

|
I recently caught up with an old friend of mine, Brian Contos, on the Cybersecurity Effectiveness Podcast, produced by Verodin. We discuss quality standards, CISO reporting, and more ... Read More
Evaluating Your Mac's Security by Ashley Zaya

Evaluating Your Mac’s Security by Ashley Zaya

|
A quick open-source search shows that the threats do indeed exist, and adversaries are regularly targeting Mac users. In fact, statistics show that macOS targeted attacks have been steadily growing over the past few years ... Read More

Fanatical About Metrics! by Richard Seiersen

|
I think Brian reached out to me for this podcast because I'm really into metrics! My first book measures the likelihood of major loss incidents like breaches, and my second one will focus on metrics and data ... Read More

Building the Enterprise Security Team by Dr. Ed Amoroso

|
In my recent podcast discussion with Brian Contos, I gave advice on building a world-class enterprise security team. I truly believe that successful security programs must focus on the basics. I hope you enjoy and benefit from the discussion! ... Read More

Cyber Workforce Development by Helen Patton

|
I use my social media accounts to keep up to date with the latest cybersecurity trends and to ask the community questions. Often, I discuss the cyber workforce because a) like all CISOs, I’m worried about our talent pool, and b) as a CISO at a university, I am often ... Read More

Verodin Headline Release (May 14, 2019) – Recent Security Alerts by Henry Peltokangas

|
The Verodin Behavioral Research Team (BRT) has released a new content pack that demonstrates adversary behaviors related to the most recent Malware Analysis Report (AR19-129A) from the Department of Homeland Security (DHS), which provides technical details on the new tool ELECTRICFISH ... Read More

Verodin Release Update – MITRE ATT&CK by Henry Peltokangas

|
On April 30, 2019, MITRE released an update to its ATT&CK framework. The update includes many welcome additions that expand the framework to cover more recent development in the threat environment, such as a new Impact Tactic and expanded techniques ... Read More

Planning to React by MacKenzie Brown

|
Regardless of merit and hard work, who you know in cybersecurity makes a difference. However, I do feel it’s deeper than that. Merit, your worth, and the impressions you leave do not just open doors but bring the most interesting characters knocking at them ... Read More

Maintaining Privacy in the Cloud by Terry Ray

|
It’s been about 10 years since I worked with Brian at Imperva. Since those days, I’ve found that industry conversations have changed, but the need to solve the ever-changing cybersecurity challenges has not, especially as it relates to application security, data security, and data privacy ... Read More

Trends in Cyber Attacks Over the Last 15 Years by Bill Crowell

|
Brian and I started this interview with a deep dive into my 57-year history in the Security and Intelligence worlds. This discussion concentrates on the massive changes in cyber threats over the last 15 years and how well the security industry has coped with those changes ... Read More