CISO Suite

3 Keys to Defending Active Directory
Carolyn Crandall | | Active Directory, anomaly detection, identity and access management, password spraying
While perimeter defenses like firewalls and antivirus software remain essential elements of comprehensive network defense, stopping 100% of attacks at the perimeter is an impossibility with today’s ever-evolving attack surface. Eventually, an ...
Security Boulevard

Push to Digitalization Boosts Cybersecurity Investment
According to a recent Crunchbase report, 2020 was a record year for cybersecurity investments, with more than $7.8 billion invested in the industry globally. The pandemic accelerated digital transformation for many companies, ...
Security Boulevard

What in the World Is a CISO?
Whilst employment has taken a downward curve over the last year or so, there are a variety of approaches I use when applying for a role to help my CV stand out ...

Diversity in the Cybersecurity Workforce
Like most technology workforce segments, the cybersecurity diversity issue is a very acute problem: there simply isn’t nearly enough representation of diverse backgrounds in cybersecurity roles, from security operations center (SOC) analysts ...
Security Boulevard

Flexibility and Security, You Can Have it All!
Every organisation is on a mission to achieve agility; if 2020 taught us anything, it’s the need to be flexible is essential in order to adapt and thrive in new and uncertain ...

Adapting Security Awareness to the Post-Pandemic World
It's time for Security Awareness to adapt by thinking Cyber The transition to working from home, as well as the necessary technological change, has had an effect on businesses all over the ...

Wordsmithing: Cybersecurity or Cyber Safety?
Words have meaning. When I was writing policies, it was imperative that ‘shall’, ‘will’, ‘may’ and ‘must’ be used correctly. The significance of a statement is dependent upon the word selected. With ...
Security Boulevard

CISO Stories Podcast: Is There a Magic Security Control List?
CISO Stories Podcast | | cis controls, CISO, Cybersecurity, Cybersecurity Collaborative, Infosec, Insights, Podcast, PodcastsCat, security, Security Controls
Never in history has the cyber defender had access to so many technologies and tools to defend our companies. This has created a “Fog of More,” making the choices difficult to manage ...

Important Strategies for Aligning Security With Business Objectives
What is the objective of implementing cybersecurity in a business? The answer might vary depending on whether you ask a security professional or a business executive. However, in any cybersecurity implementation, it’s ...

Will Ransomware Cause the End of the Internet as We Know It?
C. Warren Axelrod | | Christopher Krebs, cryptocurrency, CSO/CISO Perspectives, cybercrime, General, Ransomware, Spotlight
Is ransomware a global cyberpandemic? If not, why not? Read on … There is an article by Samuel Greengard in the April 2021 edition of Communications of the ACM with the disturbing ...