Alyssa Miller: Charting the Course Through InfoSec and Aviation

In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey ...
Safeguarding Patient Data with HITRUST Compliance: A Comprehensive Guide for Healthcare Technology Companies

Safeguarding Patient Data with HITRUST Compliance: A Comprehensive Guide for Healthcare Technology Companies

Healthcare organizations increasingly rely on technology to store, manage, and transmit sensitive patient information. As a result, safeguarding patient data against cyber threats and ensuring compliance with regulatory standards is critical, and ...
SOCs, false positives, SOC

Closing the False Positives Gap for SOC Efficiency

Eliminating false positives can remarkably enhance security operations center (SOC) efficiency and cost-effectiveness ...
Security Boulevard

Safeguarding Your SAP Landscape: Why Continuous Controls Monitoring is a CFO, CISO, and Business Owner’s Best Friend

The stakes have never been higher for protecting your SAP environment. From financial integrity to cybersecurity threats, ensuring robust controls is essential. However, traditional, manual control monitoring methods are often inefficient, resource-intensive, ...

Cisco VPN Hijacking Flaw In Secure Client Software Patched

In light of recent events, Cisco has released patches for two high-severity network vulnerabilities in its Secure Client. As per recent reports, vulnerabilities leading to the Cisco VPN hijacking flaw are being ...
Continuous Controls Monitoring from Pathlock

Introducing Pathlock Cloud’s Continuous Controls Monitoring – Revolutionizing Compliance and Risk Management

Navigating a landscape of ever-changing regulations and evolving threats, where data breaches and internal fraud make frequent headlines, robust controls monitoring has become more critical than ever. Organizations need visibility into their ...
Aretha Franklin - Think (feat. The Blues Brothers) - 1080p Full HD

Overcoming our “bossypants” bias

| | Leadership, Lean In, management
This is the fifth post in a series of posts inspired by reading Sheryl Sandberg's book, Lean In: Women, Work, and the Will to Lead. We've previously looked at some of Sandberg's evidence That women are underrepresented ...
How to Customize a Risk Register Template for Your Needs

How to Customize a Risk Register Template for Your Needs

Cybersecurity threats are rising, posing significant challenges to organizations that strive to protect their assets and maintain compliance. As projects get more complicated, keeping track becomes difficult at best and dangerous at ...
Beyoncé - ***Flawless ft. Chimamanda Ngozi Adichie

What’s the cause of the problem part two

| | Leadership, Lean In, management
This is the fourth post in a series of posts inspired by reading Sheryl Sandberg's book, Lean In: Women, Work, and the Will to Lead. Previously we discussed lack of confidence as one of the causes ...
SEC rules, cybersecurity, SEC cyber data breach rules

Five Unintended Consequences of the New SEC Cybersecurity Disclosure Rule

The SEC's recent regulatory compliance mandate regarding breach disclosures is having some unintended consequences ...
Security Boulevard