Hacking the Human – How Social Engineering Owns Our Users

Hacking the Human – How Social Engineering Owns Our Users

Highly targeted Social Engineering attacks are wreaking havoc in cybersecurity. In one recent incident, hackers used Social Engineering to defraud a US company out of nearly $100 million. The increased use of these techniques is directly related to the fact that they...

10 Habits of Great CISO’s

10 Habits of Great CISO’s

I’ve had the good fortune to collaborate and work with many truly great CISO's. Here are some observations of the personal habits that make them great and the attributes that anyone in Cybersecurity can emulate. They make time. No one in IT security has enough time....

The FUD Factor

The FUD Factor

Recently I had the opportunity to lead a panel at the Global CISO Forum in Atlanta, GA. Our panel topic was a discussion on how to avoid FUD in selling security. FUD is an acronym for Fear, Uncertainty and Doubt. The topic focused on CISO’s “selling” security to the...

Are you failing Security Basics 101?

Are you failing Security Basics 101?

Patching, backups, firewall configuration … when it comes to security, make sure you take care of your infrastructure before you invest in next-level tools.