Axio VP Cyber Risk Engineering, Lisa Young Joins (ISC)² Board

Axio VP Cyber Risk Engineering, Lisa Young Joins (ISC)² Board

| | people, Press Releases
Axio would like to congratulate Lisa Young, Vice President of Cyber Risk Engineering for her appointment to the Board of Directors of (ISC)², the world’s largest nonprofit association of certified cybersecurity professionals ...

Axio Welcomes Eric Cardwell as Director of Cyber Risk Engineering

| | people, Press Releases
We’re excited to welcome Eric Cardwell to our Axio management team as the Director of Cyber Risk Engineering. He will be responsible for addressing cyber risk requirements for industry clients, identifying government ...

Hackers don’t break in – they log in

We talked about this very often so far: Passwords are by far the weakest link when it comes to security today. 81% of successful attacks involve lost, breached or re-used passwords. There ...
Microsoft Teams Controls for Security and Compliance tutorial

Secure Working from Home – Some Ideas and Guidance

There is plenty of information out there how to secure a “Home Office” environment in these days and I do not want this to be another one. However, I tried to compile ...

Finding a Good Vendor Partner: More than Technology

Finding a security vendor that is the best fit for your company’s business objectives, culture, risk profile, and budget is challenging today. The purpose of this blog is to suggest that working ...

How to leverage “Secure Access Workstations” for the Cloud

This is a questions I get fairly often. But before I try to answer, let’s take a step back: We know that attackers typically try to compromise user accounts and then move ...

Make No Mistake — Microsoft Is A Security Company Now

That’s not a bad start of the day, reading such a headline from a Forrester analyst. I am often asked, how far we are going to drive security within Microsoft. Well, I ...

You: The First, Last and Best Data Protection and Privacy Defense – Part 2

As part of this two-part series, let’s now look to another exhibit demonstrating of how people act as the first, last and best data and privacy defense. Exhibit B: Potentially Unwanted Leaks ...

Do we really need a CSO?

I was just reading an article called Does Facebook even need a CSO? – initially my reaction was (as most of yours I guess): “What a stupid question, for sure we need ...

You: The First, Last and Best Data Protection and Privacy Defense – Part 1

If you have followed our work for any amount of time, you will note that we are fans of certain information security technologies such as encryption, AI and machine learning as well ...