How CISOs Can Foster Effective Comms and Build a Cybersecurity Program

For many organizations, security flows from the top down. That’s a problem when executives don’t emphasize security as much as they should. Cisco learned as much in its CISO Benchmark Study “Securing ...
Active Listening

Active Listening: The Secret to Any Successful Negotiation

Would you like to improve your negotiating skills? In this month's blog, find out how active listening is the secret to any successful negotiation. The post Active Listening: The Secret to Any ...

Public Health and Misinformation During COVID-19

A slew of misinformation has accompanied the COVID-19 pandemic. False claims about how the virus spreads, how it can be prevented and steps that governments are taking have been making their way ...
Assuring Mobile Messaging Security for the Enterprise

Security Experts NowSecure Choose Vaporstream as Trusted Tool for COVID-19

We’re excited to announce that security experts NowSecure chose Vaporstream as a trusted tool to use for remote communications and collaboration. As part of their mission to save the world from unsafe ...

Vaporstream and COVID-19

Businesses and organizations are adjusting to the challenges presented by COVID-19, finding ways to keep communications—both routine and emergency—ongoing as employees work from home. At times like these, it’s more important than ...
incident response Chernobyl

Chernobyl and its Cyber Lessons, Part 2: Incident Response

What can be learned from the incident response of the Chernobyl nuclear disaster in 1986? HBO’s recent “Chernobyl” series, which retold the story of the nuclear accident that threatened much of Europe ...
Security Boulevard
Incident Response

Your Network Has Been Compromised. What Now?

Security experts agree: breaches are inevitable today, which is why it’s all the more important to have an incident response plan in place. Resolving the incident when you’re still able to communicate ...
Incident Response

Phishing Just Got More Complicated

Last month, the FBI released a note warning businessesthat hackers are bypassing two-factor authentication. Two-factor authentication is usually seen as extra secure because it not only requires your username and passcode but ...

Communication – The Forgotten Security Tool

Security professionals have many tools in their toolbox. Some are physical in nature. (WireShark, Mimikatz, endpoint detection and response systems and SIEMs come to mind.) Others not so much. (These assets include ...
small business

Is Security Getting the C-Suite Attention It Deserves?

A recent report says the C-Suite is paying more mind to security issues, but other reports contradict those findings While worldwide spending on information security products and services grows annually, the focus ...
Security Boulevard