Understanding Communication Styles

Understanding Communication Styles

Picture this; you’re sitting in a restaurant with five of your friends. Two of them are Sam and Alex. When […] ...

What Are the Key Elements of an Effective Risk Management Process?

Risks are a part of everyday life. No matter what decision we take, we always weigh the pros and cons. This core element of our daily lives is risk assessment. When it ...
The Tripwire Cybersecurity Podcast

Why a CISO Needs To Speak The Language Of Business

Dr. Eric Cole, former CISO and founder of Secure Anchor Consulting, explains how learning to communicate with business language can create a more compelling case for executive buy-in. Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/the-tripwire-cybersecurity-podcastRSS: https://tripwire.libsyn.com/rssYouTube: ...
SEC government legacy remote work cities mayors collaboration remote workforce security

Protecting Collaboration Channels for Remote Work

As COVID-19 unfolded in the first half of 2020, many of us set out to explore its long-term ramifications and imagine what the ‘new normal’ could look like. We also wanted to ...
Security Boulevard
Vishing Techniques for Everyday Life

Vishing Techniques in Everyday Life

Professional social engineers use various techniques to leverage communication fundamentals to their advantage. However, do you have to be a social engineer to use these techniques yourself? Absolutely not! In ...
Def Con 28 SECTF4Kids Minecraft Competition

DEF CON® Kids: Preparing Them for the Future

Find out how we managed the DEF CON® Kids SECTF in an all virtual setting using the most popular game on the planet — Minecraft. The post DEF CON® Kids: Preparing Them ...

What is Policy Compliance? Four Tips to Help You Succeed

Policy compliance within the information security space can be an exhausting concept to wrap our heads around. Writing a policy document, publishing it to staff and then staying hands-on to ensure it ...

How CISOs Can Foster Effective Comms and Build a Cybersecurity Program

For many organizations, security flows from the top down. That’s a problem when executives don’t emphasize security as much as they should. Cisco learned as much in its CISO Benchmark Study “Securing ...
Active Listening

Active Listening: The Secret to Any Successful Negotiation

Would you like to improve your negotiating skills? In this month's blog, find out how active listening is the secret to any successful negotiation. The post Active Listening: The Secret to Any ...

Public Health and Misinformation During COVID-19

A slew of misinformation has accompanied the COVID-19 pandemic. False claims about how the virus spreads, how it can be prevented and steps that governments are taking have been making their way ...