Information Security Leader, Author, Instructor and Speaker

Default utility Image

Why it’s SASE and zero trust, not SASE vs. zero trust TAGS: | Network security architectural best practices are undergoing a dramatic shift. The long-forecasted move away from perimeter protection as a primary …Continue reading →

Default utility Image

5 essential programming languages for cybersecurity pros TAGS: | | Coding is an essential skill across almost every technological discipline today, and cybersecurity is no exception. Cybersecurity professionals must understand …Continue reading →

Default utility Image

Weighing double key encryption challenges, payoffs TAGS: | Encryption is one of the cornerstones of cybersecurity. Organizations rely on this technology to protect data while it is in …Continue reading →

Default utility Image

XDR: The Next Evolution in Endpoint Detection and Response? TAGS: | There’s a new security solution in town and it’s rapidly gaining traction. As with many security technologies that have come …Continue reading →

Default utility Image

4 Tips For Protecting Intellectual Property In Academia TAGS: Around the world, academic researchers have turned their focus to combating the novel coronavirus. From medical schools to biology labs, …Continue reading →

Default utility Image

The Fundamentals of Zero-Trust Security for Schools TAGS: When technology leaders encounter the term “zero trust” for the first time, they often find it off-putting. In a cybersecurity …Continue reading →

Default utility Image

Top 4 firewall-as-a-service security features and benefits TAGS: | For more than a decade, analysts and security pundits have declared the firewall era over and said that organizations had …Continue reading →

Default utility Image

5 Ways to Update An Agency’s Incident Response Plan TAGS: | Quick, find a copy of your agency’s cybersecurity incident response plan. Pull that binder off the shelf or call up …Continue reading →

Default utility Image

How Agencies Can Secure Data from Shared Documents After Users Leave TAGS: A decade ago, agencies struggled to build collaborative workplaces because the technology to facilitate teamwork simply didn’t exist. The advent …Continue reading →

Default utility Image

How to shift from DevOps to DevSecOps TAGS: | | | The worlds of software development and IT have changed tremendously over the last two decades. Software development evolved from the …Continue reading →