Want to Become a CISO? The Position Awaits You

Want to Become a CISO? The Position Awaits You

I first started my career in the IT industry, then move to focus on cybersecurity since the past 13 years. I got a chance to get involved with cybersecurity solutions while working for a CyberSec distributor. After which, I moved to work for other cybersecurity vendors. There are a couple of things that really helped [...]

Why the CISO matters

Why the CISO matters

The chief information security officer role hasn’t always gotten the respect it deserves. Research over the years has shown companies often treat their CISO primarily as a scapegoat for security incidents. But that may be changing – at least it is in organizations with a strong cybersecurity culture. New research by (ISC)2 shows the overwhelming majority of [...]

EDR is dead! Long live XDR!

EDR is dead! Long live XDR!

Endpoint detection and response (EDR) has been an important technology for security professionals as they attempt to find suspicious activity, or at least traces of it, on endpoints and hosts. Cybersecurity itself is as old as computers, but the EDR segment is still in its infancy with the first solutions dating back only about five [...]

The First 101 Days as a New CISO – A Chief Information Security Officer’s Playbook

The First 101 Days as a New CISO – A Chief Information Security Officer’s Playbook

If you are a new CISO or starting a new Security Leadership gig, your first few months on the job are critical to your ongoing success in your new role. In the first few months you’ll be judged, tested by your organization and staff, and put on a “stage” to perform in front of your [...]

Gartner Top 10 Security Projects for CISO in 2018

Gartner Top 10 Security Projects for CISO in 2018

CISOs should focus on these ten security projects to reduce risk and make a large impact on the business. The new chief information security officer (CISO) of a global bank is overwhelmed by his list of to dos. He knows he can’t do everything, but struggles to narrow down the endless list of potential security [...]