script for todays security link

All Posts

How CISOs Like To Be Approached By Vendors

Vendors need to reach out to CISOs, but what does a successful approach look like? Too often vendors spray and pray with outreach, rather than…

Why Compliance Doesn’t Equal Security Is a Pointless Argument

A security program shouldn’t stop at compliance, but that doesn’t mean we should undervalue it either. It’s easy to just say compliance comes down to…

What CISOs Should Be Doing During an M&A

Mergers and acquisitions always present challenges to an organization. When it comes to cybersecurity, how involved should a CISO be before AND after an acquisition,…

How to Level Up Your Cyber Career

Just like getting a job, advancing your career requires more than just technical skills. It requires you building relationships within your organizations, particularly with your…

How Broad Should Your Third Party Risk Management Program Go?

If third-party risk management becomes too broad, it effectively becomes worthless. But too narrow and you’ll miss critical risks. So how do you strike the…

Warning Signs You’re About To Be Attacked

What are the things that raise red flags that you’re about to experience an attack? We know phishing is one major indicator, but what other…

Do We Have to Fix ALL the Critical Vulnerabilities?

For years we’ve heard mantras like “patch all the things.” But with limited resources, how do you actually focus your patching efforts on the vulnerabilities…

Mitigating Generative AI Risks

As with any new technology, generative AI comes with a set of risks. So how can we address these risks to take advantage of its…

Ugh, Lawyers Take All the Fun Out of Surviving a Cyberattack (LIVE in Las Vegas)

A cyberattack is difficult enough to work through. But many CISOs might not be prepared for the legal surprises that can come in the aftermath.…

Dear Abby: Should I Sell to a CISO During a Cyberattack? (LIVE in Silicon Valley)

It seems inevitable. Whenever there’s a high profile cyberattack, salespeople come out of the woodwork asking if the affected CISO would like to see their…

Building A Cyber Strategy For Unknown Unknowns

As security professionals, we know a lot of the things we lack visibility into that can cause security issues. That alone is enough to keep…

Join us for 12-01-23 for “Hacking Trust Management” – Super Cyber Friday

Please join us on Friday December 1, 2023 for Super Cyber Friday. Our topic of discussion will be Hacking Trust Management: An hour of critical…

We’re Not Home. Please Leave Your Company’s Data After the Beep

Why are so many companies unprepared for phone-based social engineering? As an industry, we’re very familiar with the attack surface presented by email. But the…

Cybersecurity News Week in Review: Okta explains hack, Google Calendar as C2, Selling military data

This week’s Cyber Security Headlines – Week in Review is hosted by Sean Kelly with guest Howard Holton, CTO, GigaOm Here are the stories we…

Cybersecurity News:  US most breached, ChatGPT gets DDoS, Clop exploits SysAid

US most breached country last quarter The USA has the dubious honor of being the most breached country in Q3 2023 despite a decrease in…

Cybersecurity News: Shields Ready campaign, AI imagery rules for the election, App Defense Alliance moves to Linux Foundation

US launches “Shields Ready” campaign DHS, CISA, and FEMA announced this new campaign to promote overall resiliency and security for critical national infrastructure. If it…

Responsibly Embracing Generative AI

Businesses are walking a tightrope with generative AI. One the one hand, it’s a potentially disruptive technology, and no one wants to be the last…

You’re Not Alone With Imposter Syndrome

Imposter syndrome is something that a lot of cybersecurity professionals deal with, but isn’t talked about enough. With that in mind, I set out on…

Cybersecurity News: Marina Bay Sands customer data hacked, Atlassian bug escalated to 10.0 severity, Fake crypto app steals over $700,000

Singapore’s Marina Bay Sands customer data stolen in cyberattack The Marina Bay Sands (MBS) luxury resort and casino in Singapore has disclosed a data breach…

Hey, Let’s Merge Our Technical Debt With Your Understaffed Security Team! (LIVE in Miami)

Security is always going to be an issue in a merger or acquisition because you’re consolidating two completely different environments with different security cultures. When…

Cybersecurity News: Dropper bypasses Google, CISA’s zero-day worries, Google Calendar as C2

Android Dropper-as-a-Service bypasses Google’s defenses Named SecuriDropper, by researchers at ThreatFabric this Android malware appears able to bypass the Restricted Settings security measure of Android…

[12-06-23] CISO Series Podcast Live in La Jolla, CA

CISO Series Podcast came back strong post pandemic in 2023 with a string of great live shows in Clearwater, FL, Denver, Miami, Tel Aviv, New…

Cybersecurity News: Okta’s hack explanation, Looney Tunables exploited, Lazarus likes KandyKorn

Okta explains hack source and response timeline Okta security head David Bradbury called the hack an internal lapse, stating, “an employee had signed-in to their…

Cybersecurity News Week in Review: Cloudflare’s power outage, Washington breaches, Wiki-Slack attack

This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Shawn Bowen, CISO, World Kinect Corporation Cyber Security Headlines…