10 Habits of Great CISO’s

10 Habits of Great CISO’s

I’ve had the good fortune to collaborate and work with many truly great CISO's. Here are some observations of the personal habits that make them great and the attributes that anyone in Cybersecurity can emulate. They make time. No one in IT security has enough time....

The FUD Factor

The FUD Factor

Recently I had the opportunity to lead a panel at the Global CISO Forum in Atlanta, GA. Our panel topic was a discussion on how to avoid FUD in selling security. FUD is an acronym for Fear, Uncertainty and Doubt. The topic focused on CISO’s “selling” security to the...

Are you failing Security Basics 101?

Are you failing Security Basics 101?

Patching, backups, firewall configuration … when it comes to security, make sure you take care of your infrastructure before you invest in next-level tools.

New Hybrid Banking Trojan ‘GozNym’ Steals Millions

New Hybrid Banking Trojan ‘GozNym’ Steals Millions

A cybercrime gang has been using new malware to target business customers of banks in the United States and Canada and steal millions of dollars, primarily from business accounts, researchers at the IBM X-Force security group warn.

Incident Response – Anatomy of a Cybersecurity Breach

Incident Response – Anatomy of a Cybersecurity Breach

Ever wonder what it's really like to be inside a cybersecurity breach? The increasing number of high-profile compromises are a valuable warning for cybersecurity professionals. A real-life incident shouldn't be your first. Join our panel of cybersecurity experts as we...

5 Things you should know about two-factor authentication

5 Things you should know about two-factor authentication

One of the best pieces of security advice any computer expert can give you is to enable two-factor authentication for websites that support it. With password breaches so common nowadays, it could be the one thing that keeps hackers from stealing your identity online....

How to Survive the Top Ten Cybersecurity Risks of 2016

How to Survive the Top Ten Cybersecurity Risks of 2016

2016 looks like another challenging year for cybersecurity. Security threats are multiplying all over the globe and threaten to disrupt businesses, government, and individuals. Join our panel of cybersecurity experts as we discuss predictions for the Top 10...