Curated Daily Industry News

Image




From the War Room to the Boardroom – The true elevation of the CISO

From the War Room to the Boardroom – The true elevation of the CISO

6 min read
In the aftermath of the Target breach, there has been a lot of press lately on the need for a CISO in the boardroom. The Wall Street Journal, the NY Times, Forbes, and a host of other business publications are calling for a senior information risk executive to have the proverbial ‘seat at the table’ […]
FUD 2.0 – Redefining the FUD factor

FUD 2.0 – Redefining the FUD factor

6 min read
The time for FUD is over… Long Live FUD… I’ve been known to say that ‘I’ve been in InfoSec since before it was cool’. After twenty years of being on the front lines, first as a consultant, then as the one responsible for implementing a strategy and building the programs, I’ve truly lost count of […]
InfoSecurity Magazine: Explosion in Advanced Evasion Techniques (AET)

InfoSecurity Magazine: Explosion in Advanced Evasion Techniques (AET)

2 min read
An interview with Info Security magazine around the maturation of advanced evasion techniques and how attackers abilities to evade detection have matured. With the average cost of a data breach to an organization coming in at upwards of $1 million, it’s imperative to take a realistic tack when it comes to understanding and thwarting AETs, […]
Technically Philly: Fears challenge ‘bring your own device’ trend

Technically Philly: Fears challenge ‘bring your own device’ trend

2 min read
Technically Philly held a panel discussion featuring several prominent local CISO’s to talk about the evolving cybersecurity industry, the challenges we face with bring your own device, and what the future holds. Healthcare, Financial, and Government CISO’s shared their differing views on the environments they work in and how cybersecurity plays a role in their […]
The CISO Job – Getting and Keeping It

The CISO Job – Getting and Keeping It

2 min read
A Politics of Information Security Webcast Earlier this year, a panel of Chief Security Officers from some of the nation’s highest profile companies met to talk about how to get and keep the CISO job. The response was tremendous – over 1,000 people have participated in the session. But that talk only scratched the surface […]
POA: Ensuring Privacy through Secure Enclaves

POA: Ensuring Privacy through Secure Enclaves

6 min read
The very first piece I had published was in 2002 for the International Association of Privacy Professionals newsletter, discussing how secure enclaves would be beneficial to the privacy effort. The newsletter is no longer published, so I have re-published the original piece here. Ensuring Privacy through Secure Enclaves: Secure Architecture Designs that Enable Privacy For years, […]