The Security Wisdom of the All-Knowing CISO

Have you ever noticed how closely your role as the CISO of your organisation resembles that of the Wizard from “The Wizard of Oz?” As the Wizard, you are expected to be all-knowing, all-seeing and all-powerful. Your role is to keep everyone safe from t… Continue reading The Security Wisdom of the All-Knowing CISO

The 4 Stages to a Successful Vulnerability Management Program

Have you ever been around someone who is just better at something than you are? Like when you were in school and there was this person who was effortless at doing things correctly? They had great study habits, they arrived on time, they were prepared a… Continue reading The 4 Stages to a Successful Vulnerability Management Program

Secure Virtual Coffee – Top of Mind?

< Deutsch weiter unten> Yes, I am sitting in my Home Office – as you might these days. Maybe the difference is that I am more or less used to this situation, my family knows how to cope with it and I have the infrastructure to do so. Talk… Continue reading Secure Virtual Coffee – Top of Mind?

Hackers Come for Oil and Gas

Last month’s ransomware attack against the Mexican oil firm Pemex showed how the oil industry’s embrace of digital technology has made them a high-value target for hackers. The attack—a strain of ransomware that targets companies with… Continue reading Hackers Come for Oil and Gas

How to leverage “Secure Access Workstations” for the Cloud

This is a questions I get fairly often. But before I try to answer, let’s take a step back: We know that attackers typically try to compromise user accounts and then move laterally until they find higher-value credentials. The holy grail in this … Continue reading How to leverage “Secure Access Workstations” for the Cloud

DevSecOps: Beyond Manual Policy Implementation

How DevSecOps can help organization streamline and advance their processes beyond manual or hybrid solutions When someone asks you if your company prioritizes security, most of us do a quick mental checklist: Policies Procedures & processes Securi… Continue reading DevSecOps: Beyond Manual Policy Implementation

Thread Carefully: An Introduction To Concurrent Python

The ability to execute code in parallel is crucial in a wide variety of scenarios. Concurrent programming is a key asset for web servers, producer/consumer models, batch number-crunching and pretty much any time an application is bottlenecked by a resource.

It’s sadly the case that writing quality concurrent code can be a real headache, but this article aims to demonstrate how easy it is to get started writing threaded programs in Python. Due to the large number of modules available in the standard library which are there to help out with this kind of thing, it’s often the case that …read more

Continue reading Thread Carefully: An Introduction To Concurrent Python

Book review: “Own Your Future : How to Think Like an Entrepreneur and Thrive in an Unpredictable Economy” by Paul B. Brown et al. The ALBR process

I came accross this book by Paul B. Brown, Charles F. Kiefer and Leonard A. Schlesinger almost by chance. The title was enticing so I decided to give it a go. You can read it really fast and the structure is very approachable. Having an Information Sec… Continue reading Book review: “Own Your Future : How to Think Like an Entrepreneur and Thrive in an Unpredictable Economy” by Paul B. Brown et al. The ALBR process

Protecting USB Sticks

It is in my opinion a controversial discussion: Do you allow the use of USB sticks in a corporate environment and if yes, how? Obviously, today there are a lot of other means to exchange information but the USB stick still seems to be important for users. To have a presentation for an event on…

The post Protecting USB Sticks appeared first on Security Boulevard.

Continue reading Protecting USB Sticks