A Report Template for Incident Response

Preparing for cybersecurity and data privacy incidents involves creating checklists and documented plans to enable the response team to do their best during the incident. Preparation also includes creating a template that the team can use as the basis for the incident report, which is critical to ensuring that the incident is handled well. We…

Read more

September 13, 2023
Read More >>

Security Leaders Can Lower Expenses While Reducing Risk

As companies seek to optimize operations and constrain expenses, cybersecurity leaders worry about funding the projects we consider essential. Fortunately, in such an economic climate, we can achieve an outcome that benefits the organization from cybersecurity as well as financial perspectives. Here’s how. Start by critically reviewing how you’ll spend the security funds; this involves…

Read more

August 23, 2023
Read More >>

Withholding Single Sign-On from SaaS Customers is Bad for Business and Security

Despite years of public shaming by security professionals, some SaaS vendors only offer Single Sign-On (SSO) in high-end “enterprise” product tiers. By withholding this capability from smaller organizations, they put customers’ security at risk. Moreover, they base a pricing strategy on a weak signal and miss an opportunity to lower their own security risk. Charging…

Read more

May 26, 2023
Read More >>

Withholding Single Sign-On from SaaS Customers is Bad for Business and Security

Despite years of public shaming by security professionals, some SaaS vendors only offer Single Sign-On (SSO) in high-end “enterprise” product tiers. By withholding this capability from smaller organizations, they put customers’ security at risk. Moreover, they base a pricing strategy on a weak signal and miss an opportunity to lower their own security risk. Charging…

Read more

May 26, 2023
Read More >>

Certified Ethical Hacker (CEH) Cheatsheet

What is Certified Ethical Hacker (CEH) The Certified Ethical Hacker (CEH) is a prestigious professional…
Certified Ethical Hacker (CEH) Cheatsheet on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses.

May 20, 2023
Read More >>

The AI Attack Surface Map v1.0

Introduction Purpose Components Attacks Discussion Summary Introduction This resource is a first thrust at a framework for thinking about how to attack AI systems. At the time of writing, GPT-4 has only been out for a couple of months, and ChatGPT for only 6 months. So things are very early. There has been, of course, much content on…

May 16, 2023
Read More >>

Three Ways CISOs Can Drive More Meaningful Collaboration

Today’s CISOs are more than technologists—we strive to make ourselves well-rounded business leaders. This involves aligning our efforts with business objectives and collaborating with colleagues who are not experts in IT or security. In fact, Gartner’s research found that top-performing CISOs regularly meet with three times as many non-IT stakeholders as they do with IT…

Read more

May 16, 2023
Read More >>

How to Tackle the Cybersecurity Careers Gap

Too many people are unsure how to enter or grow in the cybersecurity industry. It’s a relatively young field, and we haven’t done a good job of defining what it means to have a career in it. Hiring managers who are worried about finding candidates because of the much-discussed cybersecurity skills gap should consider the…

Read more

May 12, 2023
Read More >>

As a CISO, Are You a Builder, Fixer, or Scale Operator?

When contemplating the next step in your career as a cybersecurity leader, understand what you do best and what you enjoy doing. Figuring this out will help you identify organizations and projects that will benefit from your superpowers and accelerate your growth as a professional. As an added bonus, you’ll be more effective in communicating…

Read more

May 10, 2023
Read More >>