As a CEO working alongside cybersecurity product companies, I know that integration & the connectors are necessary evil for cyber security products companies. For companies in our industry, seamless, ...
The ever-evolving landscape of data security demands constant vigilance, especially for those handling Controlled ...
Picture this: your colleague’s about to click a link that you know is dodgy. You see it happening from the corner of your eye and intervene just before it’s too late, ready to offer a ...
A few years back, my security team was tasked to create and maintain a green field environment for FEDRAMP compliance. We ...
It’s often assumed that if the board knew exactly what they wanted to hear from the CISO, they would simply communicate it.
In early June, the Ticketmaster breach brought widespread attention to the fact that Snowflake accounts did not require multi ...
In recent years, video analytics has significantly transformed the interpretation and utilization of visual data. Through ...
Do you know where all the secrets are? The probable answer to this might be NO and believe me you are not alone. The ...
Cyber risks differ from other more familiar risks in life, such as the dangers of a car crash for drivers, or a natural disaster for homeowners. These are well-defined, measurable risks with associate ...
Cybersecurity compliance is undergoing a massive shift, with regulatory frameworks rapidly introducing more complex rules, ...
In the wake of a recent breach that compromised sensitive information, a healthcare organization sought my guidance on how to significantly enhance their security posture. Drawing from my experience a ...
The release of iOS 16.4 has been a game-changer for mobile app developers: suddenly, teams can put full-fledged web browser capabilities into their applications. Almost any iOS mobile app can now be a ...