ITIL, the Change Management Process and Tripwire Enterprise

When I speak with clients about their approach to managing their IT services, many organisations mention ITIL practices as a cornerstone to their approach. This is hardly surprising since the ITIL framework describes a sensible methodology for IT manag… Continue reading ITIL, the Change Management Process and Tripwire Enterprise

ITIL, the Change Management Process and Tripwire Enterprise

When I speak with clients about their approach to managing their IT services, many organisations mention ITIL practices as a cornerstone to their approach. This is hardly surprising since the ITIL framework describes a sensible methodology for IT manag… Continue reading ITIL, the Change Management Process and Tripwire Enterprise

Stop Working in Silos: Integrating with APIs

It’s easy to be overwhelmed by the quantity of three-letter acronyms when you’re working with software and technology, but there’s three letters that are becoming increasingly more important in the world of software: API. “Appli… Continue reading Stop Working in Silos: Integrating with APIs

How to Ensure Safety from Fraud Within Your Business

Fraud is a major problem in modern-day businesses. It significantly hampers the progression of business and leads to loss of revenue. Most fraud take places through advanced technology platforms such as hacking. According to PriceWaterhouseCoopers&#821… Continue reading How to Ensure Safety from Fraud Within Your Business

7 Questions for Evaluating your Security Posture against Insider Threats

Insider threats top the list of the most dangerous cyber risks for organizations worldwide. It doesn’t take much effort for insiders to steal your sensitive data, while such activities are hard to discover and impossible to prevent. Unfortunately… Continue reading 7 Questions for Evaluating your Security Posture against Insider Threats

6 Common Misconceptions About the Security of Blockchain Technology and Smart Contracts

As blockchain technology becomes an increasingly popular option for companies searching for secure business solutions, we’re seeing more use cases for the network and smart contracts. A smart contract is a computer protocol that is used to digita… Continue reading 6 Common Misconceptions About the Security of Blockchain Technology and Smart Contracts

On the Job Evolution is a Requirement of a CISO

So you are a CISO. Now what? What got you there will not keep you there. The time for evolution is here. Much like special operations, operators of “CISO” are continually evolving. “You have to be uncommon among the uncommon.” O… Continue reading On the Job Evolution is a Requirement of a CISO

Data Integrity Follow Up: Ways to Protect Your Data

Previously, I brought attention to what I believe is one of the biggest cybersecurity challenges: data integrity. As I note in a different piece, we have entered a strange phase in our history where questioning “evidence” is not such a ludi… Continue reading Data Integrity Follow Up: Ways to Protect Your Data

What’s at Stake with NIST 800-171 and How to Ensure You’re Compliant

Over the past three years, The National Center for Standard and Technology defined 800-171 security requirements. These requirements were designed to protect Controlled Unclassified Information in Nonfederal information systems, as well as organiz… Continue reading What’s at Stake with NIST 800-171 and How to Ensure You’re Compliant

Why Cyber Security is the New Health and Safety

Many people view the Health and Safety at Work Act 1974 as unnecessary and burdensome, but its introduction has had a dramatic impact on reducing accidents in the workplace, particularly within industrial settings. Today, it controls the safety of equi… Continue reading Why Cyber Security is the New Health and Safety