Curated Daily Industry News

Image




How to Personalize Your Product Pitch for CISOs

How to Personalize Your Product Pitch for CISOs

3 min read
A Q&A with John Masserini, CISO at Millicom Telecommunications This Merritt Group blog is part of an ongoing Q&A series with CISOs on preferred marketing and sales techniques, leading up to the RSA Conference, taking place March 4-8, 2019 in San Francisco – where cyber professionals from all over the country will come together to […]
Free NIST CSF Maturity Tool

Free NIST CSF Maturity Tool

3 min read
In my previous post, ‘My Three Wishes for 2019’, I had wished that we all find a way to give back to the industry, even a little bit. In an effort to fulfill that desire, I wanted to share a simple, but effective, tool I’ve used in various forms for many years. The NIST CSF […]
My Three Wishes for 2019

My Three Wishes for 2019

4 min read
It’s the end of the year and like all of you, my news feed has been filled with ‘Predictions for 2019’ to such a point that I basically ignore them. And while I admit that I did indeed write one of those a few years back, I’ve about had more than my fill at this […]
The Identity Maturity Calculator

The Identity Maturity Calculator

1 min read
The Authentication Maturity Stack
KLogix:Cyber Security Business Podcast

KLogix:Cyber Security Business Podcast

2 min read
On this episode of Cyber Security Business, we sit down with John Masserini, CISO, Millicom, to discuss identity and access management in the current security environment. Excerpt:  Kevin West: Welcome to Cyber Security Business with Kevin & Kevin. I’m Kevin West, the CEO of K logix and I’m here with Kevin Pouche, our COO. In our […]
Fahrenheit 451 – Security Research Edition

Fahrenheit 451 – Security Research Edition

8 min read
In 1998, the US passed The Digital Millennium Copyright Act (DMCA) in an effort to enact several of the requirements of World Intellectual Property Organization (WIPO). DMCA makes it a crime to publicize technologies which are developed to bypass measures that control access to copyrighted works. DMCA also makes it a criminal act to subvert […]
The Identity Catechism: Questions every CISO should ask of their Identity program

The Identity Catechism: Questions every CISO should ask of their Identity program

17 min read
The evolution is underway. Our infrastructures are borderless, our critical data is cloud-based, and our users work from anyplace on the globe – or 36,000 feet above it. Our legacy controls are as outdated as the conceptual hardened perimeter and our users are still human; and will still succumb to the (not so) well-crafted phish. […]
SecurityWeek: Quest for Cybersecurity Metrics Fit for Business

SecurityWeek: Quest for Cybersecurity Metrics Fit for Business

2 min read
Developing clear, well defined cybersecurity metrics are necessary for the business lines to understand the risk they face. Therefore, it is often a challenge because technical risk doesn’t always relate to business risk. In this SecurityWeek article, several CISOs detail their quest for information security metrics that align with business goals. Never-ending breaches, ever-increasing regulations, […]
A Contrarian View of the NIST Digital ID Standards

A Contrarian View of the NIST Digital ID Standards

7 min read
Recently, while attending a conference in DC, I was part of a discussion around the new NIST Digital Identity Guidelines (SP 800-63) and how “…it turned the password world upside down”. Soon we were discussing the studies that were cited, and the logic behind the new recommendations, and how this would help CISO’s “look like […]
Whitehawk: 10 Rules for Cybersecurity Salespeople

Whitehawk: 10 Rules for Cybersecurity Salespeople

1 min read
I’m posting this for two reasons.  First, it’s a great read for security vendor’s salespeople. You need to memorize these rules. Secondly, and I have to be honest, I’m pretty humbled by Mark’s comments. Read the full post or download the PDF here: https://www.whitehawk.com/secure-your-business/blog/10-rules-cybersecurity-salespeople Related Posts:Cybersecurity NewsCybersecurity in the age of the pandemic
Why Diversity Matters in Leadership

Why Diversity Matters in Leadership

3 min read
As I write this, it is the celebration of Alan Turing’s 106th birthday (June 23, 1912). As someone who wears their Geek Badge proudly, one has to wonder what the world would be like without his genius. Arguably the father of modern-day computer sciences, his work was foundational for what we consider commonplace today. His bleeding-edge […]
Klogix: Profiles in Confidence – John Masserini

Klogix: Profiles in Confidence – John Masserini

3 min read
Truly honored to be a featured CISO in the Klogix Profiles in Confidence magazine.  Feats of Strength is a business-focused information security magazine created by K logix. They provide a platform for a diverse set of industry leaders to share their success and challenges. By connecting people with thought leadership content, they examine different ways to build a confident […]
Ethisphere/Opus: Risk Management as a Team Sport

Ethisphere/Opus: Risk Management as a Team Sport

2 min read
Honored to be included in this multi-topic whitepaper on how to manage risk throughout the enterprise by partnering with your business lines. In this special Risk Management report by Ethisphere and Opus, risk executives share their insights and opinions on how to build a successful culture of risk management in today’s enterprise. Executives from Finance, Risk, […]
Radware: Places to find cybersecurity talent

Radware: Places to find cybersecurity talent

2 min read
An interview with Radware around identifying cybersecurity talent in unexpected places within your enterprise. Companies are scrambling to fill cybersecurity positions. Some 41 percent of CIOs surveyed by recruiting firm Robert Half Technology say that cybersecurity skills are in the greatest demand in their organizations. The non-profit organization (ISC)2, which provides information security education and […]
SecurityWeek: Fighting CyberSecurity FUD and Hype

SecurityWeek: Fighting CyberSecurity FUD and Hype

2 min read
An interview with SecurityWeek around how FUD permeates the cybersecurity industry and how security vendors use it to sell unnecessary products. Increasingly, vendors have come under scrutiny with the never ending public fear mongering. Dr. Ian Levy is technical director at the UK’s National Cyber Security Center (NCSC), which is part of GCHQ. It is […]