OSINT – Using Threat Intelligence to Secure Your Organisation

In my first article on Cyber Security Threat Intelligence Analysts, (CTI analysts) we covered what a CTI analyst is and discussed how they can bridge the gaps between IT, Security, and the Business. We discussed how this is beneficial to the maturity o… Continue reading OSINT – Using Threat Intelligence to Secure Your Organisation

Mitigating Risks in Cloud Migration

Companies are moving to incorporate the cloud into their computing infrastructure at a phenomenal rate. This is, without question, a very positive move. It permits companies to scale processing resources up and down in response to changing demands, giv… Continue reading Mitigating Risks in Cloud Migration

Why You Need to Align Your Cloud Strategy to Your Business Goals

Your company has decided to adopt the Cloud. Or maybe it was among the first ones that decided to rely on virtualized environments before it was even a thing. In either case, cloud security has to be managed. How do you go about that? Before checking o… Continue reading Why You Need to Align Your Cloud Strategy to Your Business Goals

Addressing The Elephant in the Room: Cybersecurity’s Increasing Talent Shortage

The cybersecurity space is in dire straits. Hackers are getting smarter and more sophisticated…and the availability of skilled men and women to combat them has never been lower. It’s an issue that’s been slowly growing worse year over… Continue reading Addressing The Elephant in the Room: Cybersecurity’s Increasing Talent Shortage

Rooted in Security Basics: The Four Pillars of Cyber Hygiene

The term “cyber hygiene” pops up frequently in articles, blogs and discussions about cybersecurity. But what does it really mean? Some say it is an ill-defined set of practices for individuals to follow (or ignore). Others say it is a measu… Continue reading Rooted in Security Basics: The Four Pillars of Cyber Hygiene

Entering the Twilight Zone: Adventures in the Security Leader Search

If you’re in your 40s or 50s, you probably remember a TV series called The Twilight Zone. (Millennials, think Netflix’s Black Mirror). Every show was its own stand-alone story that took viewers into an alternate reality where things got wei… Continue reading Entering the Twilight Zone: Adventures in the Security Leader Search

Entering the Twilight Zone: Adventures in the Security Leader Search

If you’re in your 40s or 50s, you probably remember a TV series called The Twilight Zone. (Millennials, think Netflix’s Black Mirror.) Every show was its own stand-alone story that took viewers into an alternate reality where things got wei… Continue reading Entering the Twilight Zone: Adventures in the Security Leader Search

Selecting a Security Leader: Don’t Get Caught in No Man’s Land

In World War I, the space between the most-forward trenches in a battle was called No Man’s Land – a place you didn’t want to be. I learned it as a tennis term. In tennis, you want to play at the net or behind the baseline. The middle… Continue reading Selecting a Security Leader: Don’t Get Caught in No Man’s Land

Data Security Solutions for Small Businesses

Businesses that fail to take the steps necessary to protect their data, information and digital infrastructure are far more likely to suffer a data breach. A breach has the potential to do lasting harm and may even place the very survival of a business… Continue reading Data Security Solutions for Small Businesses

Some Dos and Don’ts for Hiring Your Security Leader

I’m an executive-level security headhunter. That means I spend a lot of my week doing two things: talking to CISOs or those people ready to be CISOs and consulting with companies that are in the market for a security leader. My experience is that… Continue reading Some Dos and Don’ts for Hiring Your Security Leader