AD active directory Control Defend Extend Container Security

3 Keys to Defending Active Directory

While perimeter defenses like firewalls and antivirus software remain essential elements of comprehensive network defense, stopping 100% of attacks at the perimeter is an impossibility with today’s ever-evolving attack surface. Eventually, an ...
Security Boulevard
investment Menlo Security

Push to Digitalization Boosts Cybersecurity Investment

According to a recent Crunchbase report, 2020 was a record year for cybersecurity investments, with more than $7.8 billion invested in the industry globally. The pandemic accelerated digital transformation for many companies, ...
Security Boulevard
Plankton - What I thought being a CISO was

What in the World Is a CISO?

Whilst employment has taken a downward curve over the last year or so, there are a variety of approaches I use when applying for a role to help my CV stand out ...
diversity

Diversity in the Cybersecurity Workforce

Like most technology workforce segments, the cybersecurity diversity issue is a very acute problem: there simply isn’t nearly enough representation of diverse backgrounds in cybersecurity roles, from security operations center (SOC) analysts ...
Security Boulevard
Flexibility and Security, You Can Have it All!

Flexibility and Security, You Can Have it All!

| | CISO, encryption, SD-WAN
Every organisation is on a mission to achieve agility; if 2020 taught us anything, it’s the need to be flexible is essential in order to adapt and thrive in new and uncertain ...
Adapting Security Awareness to the Post-Pandemic World

Adapting Security Awareness to the Post-Pandemic World

It's time for Security Awareness to adapt by thinking Cyber The transition to working from home, as well as the necessary technological change, has had an effect on businesses all over the ...
Safety warning

Wordsmithing: Cybersecurity or Cyber Safety?

Words have meaning. When I was writing policies, it was imperative that ‘shall’, ‘will’, ‘may’ and ‘must’ be used correctly. The significance of a statement is dependent upon the word selected. With ...
Security Boulevard
CISO Stories Podcast: Is There a Magic Security Control List?

CISO Stories Podcast: Is There a Magic Security Control List?

Never in history has the cyber defender had access to so many technologies and tools to defend our companies. This has created a “Fog of More,” making the choices difficult to manage ...
Important Strategies for Aligning Security With Business Objectives

Important Strategies for Aligning Security With Business Objectives

What is the objective of implementing cybersecurity in a business? The answer might vary depending on whether you ask a security professional or a business executive. However, in any cybersecurity implementation, it’s ...
Christopher Krebs on Cryptocurrency | Real Time with Bill Maher (HBO)

Will Ransomware Cause the End of the Internet as We Know It?

Is ransomware a global cyberpandemic? If not, why not? Read on … There is an article by Samuel Greengard in the April 2021 edition of Communications of the ACM with the disturbing ...