Tackling the Top Cybersecurity Threats of 2018
Industry experts predict the unpredictable and share ideas on threat mitigation 2017 was a terrible year for security managers. Vulnerabilities and exploits blew up, malware infections accelerated, and data breach costs reached well into the billions. So what’s in...
TrustNet Named Top 10 Managed Security Service Providers
Cyber Pearl Harbor – United States Military Preparedness and Lessons Learned For Business
December 7, 2016 marks 75 years since the Japanese surprise attack on Pearl Harbor. Today, by most estimates, as much as 85 percent of US critical infrastructure is owned by the private sector. The government's senior-most civilian, military, and intelligence...
5 Tips to Consider when Developing a Security Awareness Training Program
How to set up your security awareness training program to better protect your company
Eight Tips for Success in Becoming PCI Compliant
The PCI DSS requirements embody many security best practices
Five Reasons to Embrace a MSSP
Today’s rapidly evolving technology landscape demands responsive security
Hacking the Human – How Social Engineering Owns Our Users
Highly targeted Social Engineering attacks are wreaking havoc in cybersecurity. In one recent incident, hackers used Social Engineering to defraud a US company out of nearly $100 million. The increased use of these techniques is directly related to the fact that they...
What is a SOC Report?
The Essentials of Service Organization Control Reports
10 Habits of Great CISO’s
I’ve had the good fortune to collaborate and work with many truly great CISO's. Here are some observations of the personal habits that make them great and the attributes that anyone in Cybersecurity can emulate. They make time. No one in IT security has enough time....
The FUD Factor
Recently I had the opportunity to lead a panel at the Global CISO Forum in Atlanta, GA. Our panel topic was a discussion on how to avoid FUD in selling security. FUD is an acronym for Fear, Uncertainty and Doubt. The topic focused on CISO’s “selling” security to the...