Syndicated Blog

The Next CISO
Security blog for upcoming CIO’s, CSO’s and CISO’s

Security resolutions 2014

| | Other
On this last day of the year, it’s time to share some personal resolutions for 2014, related to information security. Auditing tools and advice With my new company CISOfy I will assist ...

A developer’s story about passion for Open Source and Security

This story is definitely a first for me. Not just because every story is unique in itself, but that it’s one of personal matter. The thing is, I quit my well-paid job, ...

Friend or Foe: The CIO – Improve your relationship with the CIO

| | CIO, Friend or Foe
Most big companies have both a CIO and a CISO (or CSO). Depending on how the company is organized, it’s the CISO reporting to the CIO. This relation is special, can be ...

Privacy Protect: Geofencing, a privacy issue or blessing?

With location based services winning quickly in popularity, we have to consider the possible privacy issues it might cause. Since a few years geofencing is being used more often to actually protect ...

DevOps: the solution for application security issues?

When thinking about the weakest link in security, humans might be leading the board. Passwords and software are following closely. Combine these factors and insecurity is born. With the fairly new DevOps ...

CISO toolbox: The tools every CISO should know

Like in every profession, good tools are already half the work. The other half however, is getting the right tool, at the right moment and using it, correct, in the right way ...

10 Golden Rules of the Outstanding CISO

| | CISO, Skills, soft skills
1. Maintain your integrity Whatever you do, be upright, incorruptible and honest. Don’t take shortcuts and give people a reason to put their trust in you. 2. Go back to the basics ...

Responsible Disclosure: Your Security Stance for Ethical Hackers

Vulnerabilities and misconfigured systems are common examples why a company would obtain a spot in the news headlines. While some big companies are showing off their bounty programs, others provide their security ...

Dark Data: the risk of missing out

If you ever used a computer, you are most likely guilty of creating dark data. This fairly new term is also known as “dusty data”, precious data collecting dust on our machines ...

What is: Security Management

In this new series “What is” we explain specific subjects within the information security domain. Since the audience of this blog is focused on high levels of understanding, we start with “What ...