New Radicals - You Get What You Give (Official Video)

Shine Theory / DevOps / Community

A podcast called The Allusionist (hosted by Helen Zaltzman) crossed my path that provided me with a light-bulb moment. The podcast focuses on language and etymology. This particular episode contextualised that focus ...
Fireside chat with Alethe Denis, VP of Dragonfly Security

10 Women in Cybersecurity You Should Follow

| | culture
October is designated National Cyber Security Awareness Month, and while the month may be coming to an end, the fight against cyber attackers will continue to intensify. This year’s cybersecurity awareness month ...

How to Integrate Security into the DevOp Process

| | culture, Cybersecurity, Trust
Oil and water. That?s often how DevOps and Security teams are described. It?s no wonder the two working together to create secure software faster isn?t yet the norm. But it can be ...
Image result for amazon echo

Our Devices Listening?

…or is it “are devices listening” to you? Well yes. There’s always a simple answer to these questions and it’s yes. Breaking it down to the basics, pretty much all of our ...

Cybersecurity Is Every Leader’s Job

Every organization is led by people who are responsible for setting the overall direction, establishing priorities, maintaining influence over organizational functions and mitigating risks. Given the wide range of organizational types across ...
Ben-matrix.png

The Quest for Optimal Security

There's no shortage of guidance available today about how to structure, build, and run a security program. Most guidance comes from a standpoint of inherent bias, whether it be to promote a ...

Some Dos and Don’ts for Hiring Your Security Leader

I’m an executive-level security headhunter. That means I spend a lot of my week doing two things: talking to CISOs or those people ready to be CISOs and consulting with companies that ...

Organizational Cybersecurity: At the Crossroads of Culture & GDPR

GDPR has been in effect since May 25th, 2018. The purpose of the regulation is twofold: to enhance the privacy of an EU citizen’s related information and to strengthen the powers of ...
Family Guy - Cobra

Hacking Hackers and their Hacks (2018)

Hacking! Is it cast aside teenage wunderkinds who can seemingly dissect all things computer with the crack of a laptop to create designer chaos? They are portrayed smoking cigarettes, roller blading and ...
Social Media versus Data Privacy (& GDPR)

Social Media versus Data Privacy (& GDPR)

 I was a late adopter waiting until about 2007 before getting onto Facebook. Back in the 2000s I remember my brother calling Facebook a platform for narcissists. Just over 10 years ...