The Role of the Fractional CISO
I recently sat down to speak with Christopher Prewitt, the CTO of Inversion6, a cybersecurity risk management firm that’s close enough to where I live that we could meet for kosher pizza. The first question I asked had to with...
Read MoreCyberhaven’s Howard Ting: The New Comprehensive Cyber Capabilities Working Group (C3WG)
In this thought leader video, Howard Ting, CEO of Cyberhaven, discusses the new Comprehensive Cyber Capabilities Working Group (C3WG), which launched this past June to explore what cybersecurity capabilities are needed to protect the assets of an organization against today’s...
Read MoreWabbi’s Brittany Greenfield on What It Takes to Keep Code Secure
Nine out of ten security breaches originate with defects in software code. This reality puts pressure on developers, and the people who manage them, to make code more secure. But, what does it mean for code to be secure? According...
Read MoreGuest Post: Cyberthreats are closer to the mainframe than they appear
By Ray Overby There’s a scene in “Jurassic Park” where a Tyrannosaurus rex chases after Jeff Goldblum and Laura Dern’s characters as they speed through the wildlife park in a Jeep. The camera pans to the car’s side mirror,...
Read MoreRSA 2022: A Reasoned, If Frustrating, Cacophony
Hunter S. Thompson opened his classic political book Fear and Loathing on the Campaign Trail ‘72 with the question, “Is this trip necessary?” Fifty years later, these words were in my head as I landed in San Francisco for RSA...
Read MoreBook Review: Digital Influence Mercenaries
Digital Influence Mercenaries: Profits and Power Through Information Warfare by James J. F. Forest (Naval Institute Press) is part of an unintended trilogy of recent books that attempt to explain the current credibility crisis in news and public opinion. Together...
Read MoreClosing of Lincoln College Show Real Life Impact of Ransomware
The scourge of ransomware is having an increasingly serious impact on real life. A spate of recent attacks is affecting people and institutions on a scale not previously seen. This week, for example, the nation of Costa Rica announced that...
Read MoreFrom BroadbandSearch: Privacy in the Digital Age: What’s At Stake and How to Protect Yourself
There’s no doubting that we live in an era unlike any other in human history. Technology has always driven human progress, and our lives almost always change in response to the latest tools we have at our fingertips. However, no...
Read MoreDo Executives Actually Get What Digital Transformation is About?
In my day job as a content writer in enterprise tech and cybersecurity, I often write about the potential of digital transformation (DX). DX is about using the power of digital technology to transform a business, especially its customer and...
Read MoreBook Review – Bombarded: How to Fight Back Against the Online Assault on Democracy
Bombarded: How to Fight Back Against the Online Assault on Democracy, by Cyrus Krohn, with Tom Farmer, takes on an ambitious topic. The authors’ goal is to demonstrate how digital media threatens to destroy American democracy. In particular, they focus...
Read MoreGuest Post: 14 Eyes – A Serious Threat to Your Online Privacy
by Mila Bera The digital revolution transformed the dynamics of communication, and several governments responded to these changes by further enhancing their surveillance and detection powers. This paved the way for a surveillance dragnet that’s intercepting massive volumes of online...
Read MoreHow to prepare for increased ransomware-as-a-service (RaaS) attacks
by Steve Freidkin One of the most insidious cybersecurity schemes today, ransomware is projected to have cost over $20 billion in 2021. That number is only expected to multiply in the coming years, so it’s crucial for business owners to...
Read MoreBook Review: Social Engineering
The new book from MIT Press, Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication, by Robert W. Gehl and Sean T. Lawson, takes on an important and ambitious topic. At the risk of...
Read MoreGuest Post: Thoughts on Cybersecurity Bills in the 117th Congress
By Liam Dorney Reading through the new report Cybersecurity Bills in the 117th Congress from the Cyber Policy Institute, I am struck by the range and scope of legislative activity on this issue. The report reviews the 80 cybersecurity-related...
Read MoreNew Report on Cybersecurity Bills in the 117th Congress
Our sister organization, The Cyber Policy Institute, just published its first, but hopefully not last report on federal legislation that deals with cybersecurity. The report, Cybersecurity Bills in the 117th Congress, summarizes the 80 bills submitted or passed by the...
Read MoreBook Review: Trust in Computer Systems and the Cloud
Trust in Computer Systems and the Cloud by Mike Bursell, CEO and co-founder of Profian, takes on a subject of monumental importance in cybersecurity that most of us tend to overlook it on a daily basis. Trust, functioning as a...
Read More