No one knows your business better than you. You know when it looks normal or when it looks strange. If you don’t have an office in Shanghai, then why are...
Can you blame the CISO who wants to quash any tool, system, or process that invites risk into the organization? CISOs face embarrassing data breaches and unceremonious terminations when employees...
Compliance checklists and attestations only go so far in mitigating cyber risk. They demonstrate a partner’s commitment to cybersecurity awareness however they only capture a snapshot in time. A vendor,...
CISOs must use every tool at their disposal to protect their PII, PHI, and IP. Most security-first organizations spend millions of dollars on security tools from firewalls and hardened networks...
If you want to protect the sensitive data you share with third parties, you need to know everything you can about that data. What data is being shared? Who’s sharing...
Anyone who has ever manufactured and sold a product in a competitive market will attest to Benjamin Franklin’s truism, “the bitterness of poor quality remains long after the sweetness of low price...
From the outside looking in, the CISO career appears pretty glamorous: lots of responsibility, lots of influence, and lots of technology. The reality unfortunately is quite different. Sure, there’s lots...
A highly secure downtown office building has multiple layers of security. Employees must show identification in order to get through the front door and their badges only grant them access...
When it comes to safeguarding organizations and the valuable digital assets they produce, hold, and share, a Zero Trust security model is considered par-excellence. But zero trust comes at a...
CISO’s clearly have an appetite for complexity. They secure and monitor an expansive ecosystem filled with sanctioned and unsanctioned systems, solutions, and devices. Most of these technologies generate, store or...
On one hand, smart devices are a blessing to healthcare, producing valuable data that fuels healthy lifestyles and improves patient care. On the other hand, these devices are a nightmare,...
There’s a fine line between protecting sensitive information from data leaks and making that information easy to share with trusted partners. Make the process too difficult for employees, and they...
In terms of sensitive information like PII, PHI, and IP, I’ve frequently said you can’t defend what you can’t see. It’s quite common for organizations to have customer data, financial...