CISO Suite
Alyssa Miller: Charting the Course Through InfoSec and Aviation
In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey ...
Safeguarding Patient Data with HITRUST Compliance: A Comprehensive Guide for Healthcare Technology Companies
Healthcare organizations increasingly rely on technology to store, manage, and transmit sensitive patient information. As a result, safeguarding patient data against cyber threats and ensuring compliance with regulatory standards is critical, and ...
Closing the False Positives Gap for SOC Efficiency
Eliminating false positives can remarkably enhance security operations center (SOC) efficiency and cost-effectiveness ...
Safeguarding Your SAP Landscape: Why Continuous Controls Monitoring is a CFO, CISO, and Business Owner’s Best Friend
The stakes have never been higher for protecting your SAP environment. From financial integrity to cybersecurity threats, ensuring robust controls is essential. However, traditional, manual control monitoring methods are often inefficient, resource-intensive, ...
Cisco VPN Hijacking Flaw In Secure Client Software Patched
In light of recent events, Cisco has released patches for two high-severity network vulnerabilities in its Secure Client. As per recent reports, vulnerabilities leading to the Cisco VPN hijacking flaw are being ...
Introducing Pathlock Cloud’s Continuous Controls Monitoring – Revolutionizing Compliance and Risk Management
Navigating a landscape of ever-changing regulations and evolving threats, where data breaches and internal fraud make frequent headlines, robust controls monitoring has become more critical than ever. Organizations need visibility into their ...
Overcoming our “bossypants” bias
This is the fifth post in a series of posts inspired by reading Sheryl Sandberg's book, Lean In: Women, Work, and the Will to Lead. We've previously looked at some of Sandberg's evidence That women are underrepresented ...
How to Customize a Risk Register Template for Your Needs
Cybersecurity threats are rising, posing significant challenges to organizations that strive to protect their assets and maintain compliance. As projects get more complicated, keeping track becomes difficult at best and dangerous at ...
What’s the cause of the problem part two
This is the fourth post in a series of posts inspired by reading Sheryl Sandberg's book, Lean In: Women, Work, and the Will to Lead. Previously we discussed lack of confidence as one of the causes ...
Five Unintended Consequences of the New SEC Cybersecurity Disclosure Rule
The SEC's recent regulatory compliance mandate regarding breach disclosures is having some unintended consequences ...