Information Security Leader, Author, Instructor and Speaker

Default utility Image

When Is a Business Ready for a Red Team Test? TAGS: | | | Cybersecurity teams spend countless hours designing, implementing and managing security controls to protect against confidentiality, integrity and availability threats. Teams …Continue reading →

Default utility Image

How Agencies Can Tackle Supply Chain Cybersecurity Threats TAGS: Cybersecurity professionals have worried for years about the insidious risk posed by supply chain attacks — that sophisticated attackers with the ability …Continue reading →

Default utility Image

Cybersecurity training for employees: The why and how TAGS: | Cybersecurity training programs play a crucial role in keeping employees informed about the changing threat landscape and about their personal …Continue reading →

Default utility Image

5 essential programming languages for cybersecurity pros TAGS: | | Coding is an essential skill across almost every technological discipline today, and cybersecurity is no exception. Cybersecurity professionals must understand …Continue reading →

Default utility Image

How to shift from DevOps to DevSecOps TAGS: | | | The worlds of software development and IT have changed tremendously over the last two decades. Software development evolved from the …Continue reading →

Default utility Image

Navigate the DOD’s Cybersecurity Maturity Model Certification TAGS: | | In January, the U.S. Department of Defense released the Cybersecurity Maturity Model Certification requirements, outlining new cybersecurity stipulations for DOD …Continue reading →

Default utility Image

How to Stop Phishing Attacks TAGS: | Most successful attacks begin with a simple message. Here is what every organization should know about eliminating email-based malware. How …Continue reading →

Default utility Image

The 5 Cybersecurity Must-Haves for Every Business TAGS: | Walking the exhibition hall at a modern cybersecurity trade show can be a dizzying experience. Vendors from every angle tout …Continue reading →

Default utility Image

Security, Privacy and Confidentiality: What’s the Difference? TAGS: | Campus administrators and faculty understand the importance of protecting sensitive student information. The past two decades have brought us a variety …Continue reading →

Default utility Image

Strategies to mitigate cybersecurity incidents need holistic plans TAGS: | Cybersecurity incidents carry with them tremendous potential for financial, operational and reputational damage to organizations. To stay ahead of the …Continue reading →