Select Page

CISO Interviews

Only the Human Firewall Stands Between Hackers and Your Data

Only the Human Firewall Stands Between Hackers and Your Data

It’s no secret that employees – whether they’re your employees or a partner’s – are the weakest link in your cybersecurity program. Regardless of an organization’s product, service, size, or industry, employees play an integral role in ensuring the business operates efficiently. Unfortunately, employees also play an integral role in exposing the organization’s intellectual property to unauthorized parties.

Jimmy Xu Answers Your DevSecOps Questions

Jimmy Xu Answers Your DevSecOps Questions

Jimmy Xu, Director of DevSecOps & Cloud Security at Trace3, recently presented “Mastering DevSecOps.” Jimmy’s presentation generated lots of great questions, which he graciously answered below. If you missed his presentation or would like to watch it again, you can view it below.

Why Hackers Can’t Wait for School to Start

Why Hackers Can’t Wait for School to Start

Schools will struggle with more than COVID-19 as kids return this Fall – whether virtually, on campus, or a combination of the two. Colleges and universities contain lots of sensitive data that hackers cherish. Unless schools protect this PII, PHI, and IP, hackers will use it for social engineering, financial fraud, or a competitive advantage.

It’s the Service Providers You Value the Most That Hurt You the Worst

It’s the Service Providers You Value the Most That Hurt You the Worst

No man is an island. The same can be said about your business. Your organization relies on countless people for its survival, let alone its success. Ironically, many of these contributors work for someone else. Suppliers, vendors, consultants, contractors, and other service providers deliver tremendous value to organizations. Unfortunately, these service providers also pose significant risk.

Want to Close the Skills Gap? Here’s How.

Want to Close the Skills Gap? Here’s How.

The only constant in life is change. Sometimes change comes from an existential crisis. Need proof? Ask a CISO. The cybersecurity function traditionally solved technology problems with technology solutions. Cybersecurity experts learned however that technology is only part of the equation. Businesses do not function without people.

What CISOs and Cat Herders Have in Common

What CISOs and Cat Herders Have in Common

What do CISOs and cat herders have in common? Both are good at herding cats. This may be an odd skill for a highly-skilled profession that couples technology with risk mitigation. But the CISO role is a people role first and foremost. This requires the CISO to attend lots of meetings, ask lots of questions, and provide expert counsel.

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.