Wednesday, September 22, 2021
Home Interviews

Interviews

The Psychology of Phishing

The Psychology of Phishing

“There is no silver bullet that can completely eradicate all risks of phishing attacks, but there are many actions that can mitigate the risks...
Digital Certificates Hold the Key to Strengthen Cybersecurity Posture

Digital Certificates Hold the Key to Strengthen Cybersecurity Posture

“The proliferation of digital keys, certificates and secrets means that IT and security leaders recognize the need for an enterprise-wide cryptography and machine identity...
Cybersecurity Begins With Employee Wellness

Cybersecurity Begins With Employee Wellness

An effective cybersecurity strategy requires a multi-layered approach. Employee security awareness is not a “silver bullet,” but it plays a significant role in mitigating...
The Entire Organization is Responsible for Cybersecurity

The Entire Organization is Responsible for Cybersecurity

“The data indicates that there is a disconnect between decision-makers and cybersecurity teams. There needs to be consistent communication, whereas, at the moment, over...
Countering the Cybersecurity Challenges related to today’s Data Volumes

Countering the Cybersecurity Challenges related to today’s Data Volumes

“Incidents can be stressful situations where mistakes happen because of the added stress, rehearsing them reduces the chances of error and helps identify issues...
Best Practices for IoT Security Risk Management

Best Practices for IoT Security Risk Management

“From a security perspective, we often look at IoT in the wrong way. We look at these new devices as highly vulnerable and risky,...
How CISOs can Secure their Mission Critical Data Systems

How CISOs can Secure their Mission Critical Data Systems

“Imagine a software platform with enough data to know proactively who needs access, to what, and to identify those with unneeded access all in...
How CISOS can Leveraging UEM software to Strengthen the Cybersecurity

How CISOs can leverage UEM to Strengthen Cybersecurity

“Improving endpoint security should be an immediate priority for CISOs. No matter how fragmented the remote working environment, employees still need to securely access...
Is it Time to Say Goodbye to Passwords?

Is it Time to Say Goodbye to Passwords?

“Bringing everything into one place and integrating different tools enables organizations to better use the power of their entire security ecosystem, creating a more...
Steps for CISOs to Monitor Various Cloud Environments

Steps for CISOs to Monitor Various Cloud Environments

“Cloud environments can be reasonably complex, containing many different components, and each of these components should be mapped to one or more business functions...

Latest posts