GUEST ESSAY: AntiguaRecon – A call to train and promote the next generation of cyber warriors

GUEST ESSAY: AntiguaRecon – A call to train and promote the next generation of cyber warriors

Imagine being a young person who wants a career, of whatever type you can find, as a cybersecurity professional. Related: Up-skilling workers to boost security Related Although you were born with an ...
GUEST ESSAY — The rationale for pursuing a culture of cybersecurity– and a roadmap to get there

GUEST ESSAY — The rationale for pursuing a culture of cybersecurity– and a roadmap to get there

Organizations with strong cybersecurity cultures experience fewer cyberattacks and recover faster than others. Related: Deploying human sensors This results from emulating the culture building approaches of high-risk industries like construction that devote ...
GUEST ESSAY: Here’s why a big cybersecurity budget won’t necessarily keep your company safe

GUEST ESSAY: Here’s why a big cybersecurity budget won’t necessarily keep your company safe

The cybersecurity landscape is constantly changing. While it might seem like throwing more money into the IT fund or paying to hire cybersecurity professionals are good ideas, they might not pay off ...
GUEST ESSAY: Scammers leverage social media, clever con games to carry out digital exploitation

GUEST ESSAY: Scammers leverage social media, clever con games to carry out digital exploitation

One common misconception is that scammers usually possess a strong command of computer science and IT knowledge. Related: How Google, Facebook enable snooping In fact, a majority of scams occur through social ...
GUEST ESSAY: Could CISOs be on the verge of disproving the ‘security-as-a-cost-center’ fallacy?

GUEST ESSAY: Could CISOs be on the verge of disproving the ‘security-as-a-cost-center’ fallacy?

This year has kicked off with a string of high-profile layoffs — particularly in high tech — prompting organizations across all sectors to both consider costs and plan for yet another uncertain ...
GUEST ESSAY: Five stages to attain API security — and mitigate attack surface exposures

GUEST ESSAY: Five stages to attain API security — and mitigate attack surface exposures

APIs (Application Programming Interfaces) play a critical role in digital transformation by enabling communication and data exchange between different systems and applications. Related: It’s all about attack surface management APIs help digital ...
GUEST ESSAY:  Why CISOs absolutely must take  authentication secrets much more seriously

GUEST ESSAY: Why CISOs absolutely must take authentication secrets much more seriously

The IT world relies on digital authentication credentials, such as API keys, certificates, and tokens, to securely connect applications, services, and infrastructures. Related: The coming of agile cryptography These secrets work similarly ...
GUEST ESSAY: Testing principles to mitigate real-world risks to ‘SASE’ and ‘Zero Trust’ systems

GUEST ESSAY: Testing principles to mitigate real-world risks to ‘SASE’ and ‘Zero Trust’ systems

A new generation of security frameworks are gaining traction that are much better aligned to today’s cloud-centric, work-from-anywhere world. Related: The importance of ‘attack surface management’ I’m referring specifically to Secure Access ...
GUEST ESSAY: The case for complying with ISO 27001 — the gold standard of security frameworks

GUEST ESSAY: The case for complying with ISO 27001 — the gold standard of security frameworks

Of the numerous security frameworks available to help companies protect against cyber-threats, many consider ISO 27001 to be the gold standard. Related: The demand for ‘digital trust’ Organizations rely on ISO 27001 ...
GUEST ESSAY: Too many SMBs continue to pay ransomware crooks — exacerbating the problem

GUEST ESSAY: Too many SMBs continue to pay ransomware crooks — exacerbating the problem

Well-placed malware can cause crippling losses – especially for small and mid-sized businesses. Related: Threat detection for SMBs improves Not only do cyberattacks cost SMBs money, but the damage to a brand’s ...