9 Mistakes Your B2B Business Website Is Making

9 Mistakes Your B2B Business Website Is Making

When you first start your company, you just want to get a website up and running and get the word out about what you do. However, it’s easy to make mistakes in ...

HP Moves to Increase Desktop and Printer Security Lead with Bromium

HP just announced the acquisition of Bromium, a unique small security company. I must admit the name “Bromium” kind of sounds like something you’d take if you had a stomach problem, but ...

How to leverage “Secure Access Workstations” for the Cloud

This is a questions I get fairly often. But before I try to answer, let’s take a step back: We know that attackers typically try to compromise user accounts and then move ...

Decentralized identity and the path to digital privacy

This week the European Identity and Cloud Conference took place, where Joy Chik, Corporate Vice President, Microsoft Identity was talking. She was actually announcing some very interesting efforts around identity and privacy, ...

Make No Mistake — Microsoft Is A Security Company Now

That’s not a bad start of the day, reading such a headline from a Forrester analyst. I am often asked, how far we are going to drive security within Microsoft. Well, I ...
CISO Strategy

KLogix:Cyber Security Business Podcast

| | CISO, Media, Podcast, strategy
On this episode of Cyber Security Business, we sit down with John Masserini, CISO, Millicom, to discuss identity and access management in the current security environment. Excerpt: Kevin West: Welcome to Cyber ...

Make Sure Your Network Security Is Ready for the Holiday Shopping Season

The holiday shopping season kicks off tomorrow. There will be a notable spike in holiday shopping as people across the country rush to take advantage of the deals and bargains available on ...

An important step toward peace and security in the digital world

I think we are all in agreement that the internet as it is today is a great achievement but there needs to be a certain level of agreement between the different players ...
Fundamentals

The Identity Catechism: Fifteen questions every CISO should ask about their Identity program

The evolution is underway. Our infrastructures are borderless, our critical data is cloud based, and our users work from anyplace on the globe – or 36,000 feet above it. Our legacy controls ...

Does AI solve it all?

Artificial Intelligence and Machine Learning hold a lot of promises in security. They will help us address the problems around false positives and detecting anomalies. There is a lot of hope and ...