
Lessons from the Field, Part III: Why Backups Alone Won’t Save You
James Keiser, Director of Secured Managed Services Southeast, CISO Global, Inc. It’s been a while since I’ve put some thoughts together for the CISO Blog, and with World Backup Day coming at ...

CMMC is Here: Simplifying Compliance with Enclaves
A joint blog featuring CISO Global’s Compliance Team & PreVeil The long-anticipated CMMC rule (CFR 32) is now live, marking a crucial turning point for defense contractors. The Compliance Team at CISO ...

New Guidelines: Cybersecurity Resilience in the Healthcare Industry
Lou Morentin, VP of Compliance & Privacy There are a number of significant changes coming to Healthcare Cybersecurity requirements. While not all are finalized, they point the way towards Health and Human ...

Love, Lies, and Loss: The Rise of Romance Scams
Gary Perkins, CISO at CISO Global While Valentine’s Day is a celebration of love, it’s also a time to be cautious. Scammers prey on our most vulnerable emotions, manipulating those longing for ...

Why 24/7 Security Monitoring Matters for Your Company
Gary Perkins, CISO at CISO Global Cyber threats don’t take evenings or weekends off, and neither should your security team. Companies need peace of mind knowing that dedicated professionals are continuously monitoring ...

DeepSeek: The Silent AI Takeover That Could Cripple Markets and Fuel China’s Cyberwarfare
David Jemmett, CEO & Founder of CISO Global Unlike Western AI systems governed by privacy laws and ethical considerations, DeepSeek operates under a regime notorious for state-sponsored hacking, surveillance, and cyber espionage ...

Did You Hire a Spy? Risks and Strategies for Securing Remote Workers
hmeyers | | Blog Posts, CISO, Cybersecurity Training, Espionage, remote workers, security, stategy & risk
Former Military Intelligence Agents Turned Cybersecurity Experts at CISO Global In today’s high-stakes digital landscape, hiring remotely requires diligence and vigilance. Trust is important, but verifying that trust is non-negotiable. The consequences ...

Back to the Basics For 2025: Securing Your Business
Gary Perkins, CISO at CISO Global Cybersecurity may seem complex, but it boils down to consistent implementation of best practices. Disabling unnecessary services, securing cloud configurations, enforcing MFA, training employees, and adopting ...

CES 2025: Think Before Relying on Shiny New Solutions
Chris Clements, VP of Solutions Architecture Just as a $5,000 gaming PC won’t make someone a better gamer if they haven’t mastered the basic controls, a sophisticated security solution won’t protect an ...

Protecting Your Heart and Wallet: A Guide to Safe Charitable Giving
The holiday season brings out the best in people, with many feeling inspired to support worthy causes. Unfortunately, it also attracts scammers who prey on this generosity. Here’s how to ensure your ...