strategy
7 Core Controls of a Solid Data Governance Strategy
Data is the lifeblood of every business. This adage is more true today, in the corporate digital transformation era than ever before. Some equate data with oil, while others equate data with ...

Navigating the Future of AI: Understanding AI Regulation
AI regulation addresses privacy, security, fairness, transparency, and accountability concerns while promoting innovation and benefiting society ...

What you Missed in the White House National Cybersecurity Strategy
On the heels of the White House’s National Cybersecurity Strategy, there were plenty of reactions and opinions about how cybersecurity strategies and priorities must change. But most people missed one critical callout: ...

Survey: Reactionary Cybersecurity is Misaligned With Business Goals
A global survey of 409 cybersecurity and IT decision-makers from companies with at least 250 employees suggested that while there is a lot more attention being paid to aligning cybersecurity strategy with ...

ASM: The Best Defense is a Good Offense
About 10 years ago, security was relatively simple because everything occurred on premises. Change releases were tightly controlled by a change ticket and review process. In contrast, current networks consist of auto-scaling ...

Grappling with the Unpredictable Second-Order Effects of LLM
Yogi Berra was (among other things) an incredible quote machine, and he’s often credited with the following gem: “It’s tough to make predictions, especially about the future.” Yes indeed. Seeing how the ...

Doing the Work: How to Architect a Systematic Security Program, Part 3
Building a security program from the ground up is a complicated, complex undertaking that can pay massive dividends down the road. We firmly believe that “the devil is in the details,” in ...

Better Decisions Equal Better Exposure Management
Business success essentially boils down to awareness of potential risks and making good decisions to avoid or mitigate those risks. The businesses that do this well thrive, while businesses that fail in ...

Attackers: Modern Day API Cartographers
Attackers are like modern-day cartographers. The cartographers of old weren’t necessarily sailing the coastline of New England, drawing a map as they sailed. Instead, they talked to people who did the sailing ...

Framework Selection: How to Architect a Systematic Security Program – Part 1
A need for public trust in information systems has driven continuous technological advances and new regulatory requirements, which have in turn made the global cyber threat landscape more complex and connected (see ...