5 Risks You Need to Remember When Securing Your Containers

Containers are on the rise. As reported by GlobalNewswire, Allied Market Research estimated that the application market would grow from its 2016 value of $698 million to $8.20 by 2025. With a compound annual growth rate of 31.8% between 2018 and 2025, … Continue reading 5 Risks You Need to Remember When Securing Your Containers

Using Zero Trust to Ease Compliance

The era of compliance and business and consumer demand for privacy is upon us The rising number of privacy and compliance standards has increased anxiety among many enterprise owners. Between PCI-DSS to HIPAA, the EU’s GDPR to Mexico’s Protection of P… Continue reading Using Zero Trust to Ease Compliance

Zero-day Vulnerabilities and the Visibility Gap Challenge During Mass Remote Work

As the world collectively deals with COVID-19, many organizations have enacted company-wide work from home policies to help slow the spread of the virus. For many organizations the sudden requirement to support home working en masse has exposed an unco… Continue reading Zero-day Vulnerabilities and the Visibility Gap Challenge During Mass Remote Work

11 Ways to Strengthen Cyber Hygiene With a Remote Workforce

Now more than ever, it is critical that security leaders take measures to ensure cyber hygiene across their enterprise. Malicious actors are launching attacks against organizations of all sizes and their employees, who are by and large working rem… Continue reading 11 Ways to Strengthen Cyber Hygiene With a Remote Workforce

Cloud Security Threats: Escaping the Egregious Eleven – Part Two

Depending on your familiarity with the Cloud Security Alliance (CSA) publications, part one of this blog was intended as either an introduction or a nagging reminder of the ‘Egregious Eleven’ security threats to cloud computing. It also hop… Continue reading Cloud Security Threats: Escaping the Egregious Eleven – Part Two

An open conversation about cyber-risk reporting to the BOD

A few days ago, I had the privilege of moderating a boardroom discussion of CISOs at the Evanta Dallas CISO Summit on the topic of Cyber-Risk Reporting for the Board. Evanta’s boardroom discussions are great since they serve as fantastic opp… Continue reading An open conversation about cyber-risk reporting to the BOD

Mitigating Risk and High-Risk Vulnerabilities in Unsupported Operating Systems: BlueKeep Edition

How many times has a vendor released a critical cybersecurity patch for an operating system that is in “end of life” (EOL), or the lifecycle period where the vendor no longer issues patches for bug fixes, operational improvements and cybers… Continue reading Mitigating Risk and High-Risk Vulnerabilities in Unsupported Operating Systems: BlueKeep Edition