culture
Shine Theory / DevOps / Community
A podcast called The Allusionist (hosted by Helen Zaltzman) crossed my path that provided me with a light-bulb moment. The podcast focuses on language and etymology. This particular episode contextualised that focus ...
10 Women in Cybersecurity You Should Follow
October is designated National Cyber Security Awareness Month, and while the month may be coming to an end, the fight against cyber attackers will continue to intensify. This year’s cybersecurity awareness month ...
How to Integrate Security into the DevOp Process
Oil and water. That?s often how DevOps and Security teams are described. It?s no wonder the two working together to create secure software faster isn?t yet the norm. But it can be ...
Our Devices Listening?
…or is it “are devices listening” to you? Well yes. There’s always a simple answer to these questions and it’s yes. Breaking it down to the basics, pretty much all of our ...
Cybersecurity Is Every Leader’s Job
Every organization is led by people who are responsible for setting the overall direction, establishing priorities, maintaining influence over organizational functions and mitigating risks. Given the wide range of organizational types across ...
The Quest for Optimal Security
There's no shortage of guidance available today about how to structure, build, and run a security program. Most guidance comes from a standpoint of inherent bias, whether it be to promote a ...
Some Dos and Don’ts for Hiring Your Security Leader
I’m an executive-level security headhunter. That means I spend a lot of my week doing two things: talking to CISOs or those people ready to be CISOs and consulting with companies that ...
Organizational Cybersecurity: At the Crossroads of Culture & GDPR
GDPR has been in effect since May 25th, 2018. The purpose of the regulation is twofold: to enhance the privacy of an EU citizen’s related information and to strengthen the powers of ...
Hacking Hackers and their Hacks (2018)
Hacking! Is it cast aside teenage wunderkinds who can seemingly dissect all things computer with the crack of a laptop to create designer chaos? They are portrayed smoking cigarettes, roller blading and ...
Social Media versus Data Privacy (& GDPR)
I was a late adopter waiting until about 2007 before getting onto Facebook. Back in the 2000s I remember my brother calling Facebook a platform for narcissists. Just over 10 years ...

