The Future of Cyberwarfare

Over the years, we have seen an escalation in the series of hacks on health care services, power grids, nuclear plants and our privacy, with no respite. The threat is not just from China alone. It could be from North Korea or, as a matter of fact, fro… Continue reading The Future of Cyberwarfare

Is Cybersecurity More Difficult Than Going to Mars?

Exploration and evolution are written into the very fabric of humanity. Since the planets in our solar system were named, traveling to Mars has been nothing short of a farfetched dream. However, the rapid rise of digital transformation has changed the… Continue reading Is Cybersecurity More Difficult Than Going to Mars?

3 Hiking Principles That Made Me a Better CISO

When I am not studying the newest cybersecurity threat or preparing an enterprise and its employees for the next inevitable cyberattack, I can be found traipsing through California’s Sierra Nevada or in the depths of Death Valley. It was during these … Continue reading 3 Hiking Principles That Made Me a Better CISO

Decentralizing Cloud Security Management

People are right to be concerned about cloud security risks. The agility, flexibility, scalability and affordability of cloud, while addressing many IT infrastructure challenges, also introduces a host of security risks and potential vulnerabilities. … Continue reading Decentralizing Cloud Security Management

A Close Call Prompts Security Reassessment

Having worked in the industry for over 10 years, I consider myself a veteran cybersecurity professional. Still, that didn’t protect me against (almost) becoming a victim of malware-based credential theft. What looked like a formatting issue on m… Continue reading A Close Call Prompts Security Reassessment

Breach Clarity Data Breach Report: Week of March 1

Each week Breach Clarity compiles a list of what it considers to be notable data breaches—those that are worth highlighting because of the increased intensity of the risk to personal information. The Breach Clarity score identifies the level of risk o… Continue reading Breach Clarity Data Breach Report: Week of March 1

Betting Big on Identity and Authentication

Last year, 2020, was a year of accelerated digital transformation with COVID-19 related lockdowns pushing preexisting trends into overdrive. We saw more quantum leaps in cloud adoption, remote work and digital transformation in a single year than we&#… Continue reading Betting Big on Identity and Authentication

XDR: Next-Level Prevention and Detection

Security professionals are inundated with thousands of alerts per day generated by a growing number of cybersecurity tools. Investigating and connecting individual alerts to events often takes days. Seeing the proverbial forest for the trees is an ong… Continue reading XDR: Next-Level Prevention and Detection

XDR: Next-Level Prevention and Detection

Security professionals are inundated with thousands of alerts per day generated by a growing number of cybersecurity tools. Investigating and connecting individual alerts to events often takes days. Seeing the proverbial forest for the trees is an ong… Continue reading XDR: Next-Level Prevention and Detection

Breach Clarity Data Breach Report: Week of Feb. 22

Each week Breach Clarity compiles a list of what it considers to be notable data breaches—those that are worth highlighting because of the increased intensity of the risk to personal information. The Breach Clarity score identifies the level of risk o… Continue reading Breach Clarity Data Breach Report: Week of Feb. 22