CISO January 27, 2020 Are More Defined Parameters the Key to Addressing the Cybersecurity Skills Gap? 4 min read - Is an inability to define security the main cause of the cybersecurity skills gap? If we can't truly define what security is, how can organizations design the right cybersecurity jobs for their needs?
Artificial Intelligence May 10, 2019 4 Information Security Slipups From ‘Star Trek: Discovery’ to Avoid in the Enterprise 5 min read - How does Star Trek's information security stack up against current cybersecurity hygiene best practices? Turns out the future's not so bright.
CISO December 27, 2017 Long Road Ahead or Unbridgeable Chasm? Lessons From the EY ‘Global Information Security Survey’ 4 min read - The EY "Global Infomation Security Survey" revealed that CISOs and executives have a long road ahead when it comes to improving communication — but it is indeed a road, not an unbridgeable chasm.
August 17, 2017 Gartner Report: Information Security Product Spending to Grow Seven Percent in 2017 2 min read - Gartner predicted that information security spending will reach $86.4 billion in 2017. Other trends included security service bundles and IT outsourcing.
Government June 9, 2017 Building Upon Trump’s Executive Order on Cybersecurity 3 min read - President Trump's executive order on cybersecurity sent a powerful message about the real-world implications of information security.
CISO June 2, 2017 Information Security in the Age of Disinformation 3 min read - With so much disinformation being reported in the news and spread through social media, it's hard for security professionals to know what to believe.
Government May 12, 2017 100-Day Government IT Roundup: Immigration, Innovation and Information Security in Trump’s America 3 min read - The state of government IT was a central issue during last year's election and continues to drive decision-making within Trump's administration.
Advanced Threats December 15, 2016 Insider Threats, Industrial Sabotage and Game Theory, Part 3: Multiplayer Games 3 min read - Organizations seeking to prevent insider threats should establish red, blue and black teams to produce threat models for multiplayer games.
Advanced Threats October 20, 2016 Insider Threats, Industrial Sabotage and Game Theory: Part 2 4 min read - When it comes to securing industrial IT environments, the implications of game theory vary depending on whether the parties cooperate, collude or defect.
CISO October 4, 2016 The Role of the CISO for Law Firms 3 min read - This is the first installment in a four-part series about industry CISOs. Be sure to check back next week for the second chapter. Any effective information security program has a dedicated professional in charge. This person is usually the chief…