The 4 Stages to a Successful Vulnerability Management Program

Have you ever been around someone who is just better at something than you are? Like when you were in school and there was this person who was effortless at doing things ...
Microsoft Teams Controls for Security and Compliance tutorial

Secure Working from Home – Some Ideas and Guidance

There is plenty of information out there how to secure a “Home Office” environment in these days and I do not want this to be another one. However, I tried to compile ...

Secure Virtual Coffee – Top of Mind?

< Deutsch weiter unten> Yes, I am sitting in my Home Office – as you might these days. Maybe the difference is that I am more or less used to this situation, ...

Hackers Come for Oil and Gas

Last month’s ransomware attack against the Mexican oil firm Pemex showed how the oil industry’s embrace of digital technology has made them a high-value target for hackers. The attack—a strain of ransomware ...

How to leverage “Secure Access Workstations” for the Cloud

This is a questions I get fairly often. But before I try to answer, let’s take a step back: We know that attackers typically try to compromise user accounts and then move ...
DevSecOps: Beyond Manual Policy Implementation

DevSecOps: Beyond Manual Policy Implementation

How DevSecOps can help organization streamline and advance their processes beyond manual or hybrid solutions When someone asks you if your company prioritizes security, most of us do a quick mental checklist: ...
Security Boulevard

Shared Responsibility in the Cloud (and how to mess it up)

I am deeply convinced that moving to the Cloud – for most companies – will increase their security dramatically – I would even go that far that a secure future without leveraging ...