Information Security Leader, Author, Instructor and Speaker

Default utility Image

Select a customer IAM architecture to boost business, security TAGS: | | The importance of identity and access management in the modern digital enterprise cannot be denied. These programs ensure employees have …Continue reading →

Default utility Image

Cybersecurity training for employees: The why and how TAGS: | Cybersecurity training programs play a crucial role in keeping employees informed about the changing threat landscape and about their personal …Continue reading →

Default utility Image

Why it’s SASE and zero trust, not SASE vs. zero trust TAGS: | Network security architectural best practices are undergoing a dramatic shift. The long-forecasted move away from perimeter protection as a primary …Continue reading →

Default utility Image

5 essential programming languages for cybersecurity pros TAGS: | | Coding is an essential skill across almost every technological discipline today, and cybersecurity is no exception. Cybersecurity professionals must understand …Continue reading →

Default utility Image

Weighing double key encryption challenges, payoffs TAGS: | Encryption is one of the cornerstones of cybersecurity. Organizations rely on this technology to protect data while it is in …Continue reading →

Default utility Image

XDR: The Next Evolution in Endpoint Detection and Response? TAGS: | There’s a new security solution in town and it’s rapidly gaining traction. As with many security technologies that have come …Continue reading →

Default utility Image

4 Tips For Protecting Intellectual Property In Academia TAGS: Around the world, academic researchers have turned their focus to combating the novel coronavirus. From medical schools to biology labs, …Continue reading →

Default utility Image

The Fundamentals of Zero-Trust Security for Schools TAGS: When technology leaders encounter the term “zero trust” for the first time, they often find it off-putting. In a cybersecurity …Continue reading →

Default utility Image

Top 4 firewall-as-a-service security features and benefits TAGS: | For more than a decade, analysts and security pundits have declared the firewall era over and said that organizations had …Continue reading →

Default utility Image

5 Ways to Update An Agency’s Incident Response Plan TAGS: | Quick, find a copy of your agency’s cybersecurity incident response plan. Pull that binder off the shelf or call up …Continue reading →