All Posts

[6-26-20] Hacking Tool Optimization – CISO Series Video Chat

Join us for Friday, June 26th, 2020 at 10 AM Pacific/1 PM Eastern for “Hacking Tool Optimization: An hour of critical thinking on improving the efficiency…

[6-19-20] PREVIEW “Hacking API Security” Video Chat

Join us for Friday, June 19th, 2020 at 10 AM Pacific/1 PM Eastern for “Hacking API Security: An hour of critical thinking on protecting the connective…

Best Quotes from “25 API Security Tips You’re Probably Not Considering”

Earlier this week I published an article “25 API Security Tips You’re Probably Not Considering”. If you haven’t read the article yet, or you’re looking…

[6-25-20] Join us for “Hacking Security Culture”

Hey everyone, I’m going to be hosting a special video chat, just like my Friday chats, but on Thursday, June 25th, as part of Living…

Defense in Depth: Role of the BISO

What is a business information security officer or BISO? Do you need one? Is it just an extension of the CISO or is it simply…

Best Moments from “Hacking the Risk Decision Making Process” Video Chat

Here are the highlights from “Hacking the Risk Decision Making Process” Video Chat. To watch the full video and read the chat go here. This video…

Keep Pouring. I’ll Tell You When I’ve Had Enough Security.

When do we hit the diminishing returns of too much cybersecurity? How will we know? Will a bell go off? Will our cup runneth over?…

[6-19-20] Hacking API Security – CISO Series Video Chat

Join us for Friday, June 19th, 2020 at 10 AM Pacific/1 PM Eastern for “Hacking API Security: An hour of critical thinking on protecting the connective…

25 API Security Tips You’re Probably Not Considering

Your APIs (application programming interfaces) are a tunnel to your data, and the bad guys know it. In fact, those APIs have become a rather…

Defense in Depth: Shared Accounts

As bad as all security professionals know, shared accounts are a fact in the business world. They still linger, and from an operational standpoint they’re…

Best Moments from “Hacking Zero Budget Security” Video Chat

Here are the highlights from “Hacking Zero Budget Security” Video Chat. To watch the full video and read the chat go here. I moderated the discussion…

Facebook Personality Quiz Asks, “What’s Your Favorite Password?”

What’s your favorite combination of letters, numbers, and symbols you like to use to log onto your favorite app or financial institution? Enter our contest…

[6-12-20] Hacking Rogue IT – CISO Series Video Chat

Join us Friday, June 12th, 2020 at 10 AM Pacific/1 PM Eastern for “Hacking Rogue IT: An hour of critical thinking about employees deploying unproven and…

Defense in Depth: Bug Bounties

What is the successful formula for a bug bounty program? Should it be run internally, by a third party, or should you open it up…

[5-29-20] PREVIEW “Hacking Zero Budget Security” Video Chat

Join us Friday, May 29th, 2020 at 10 AM Pacific/1 PM Eastern for “Hacking Zero Budget Security: An hour of critical thinking about what you…

Great Security Program. Too Bad We Can’t Implement It.

Security theory only goes so far. If you want your security program to work, everyone has to do their part. This week’s episode of CISO/Security…

[6-5-20] Hacking the Risk Decision Making Process – CISO Series Video Chat

Join us for Friday, June 5th, 2020 at 10 AM Pacific/1 PM Eastern for “Hacking the Risk Decision Making Process: An hour of critical thinking…

Defense in Depth: Data Classification

The more data we horde, the less useful any of it becomes, and the more risk we carry. If we got rid of data, we…

Best Moments from “Hacking the Visibility of the Cloud” Video Chat

Highlights from “Hacking the Visibility of the Cloud” Video Chat. To watch the full video and read the chat go here. I moderated the discussion…

We Promoted the Competition and Still Won

If you’re having a problem getting people to discover a need for your product, then maybe you have to do a better job promoting the…

What We Can Learn from the Israeli Cybersecurity Community

At Cybertech in Tel Aviv, I asked attendees what can the rest of the world learn from the Israeli cybersecurity community. Simply put, they start…

Defense in Depth: Prevention vs. Detection and Containment

We agree that preventing a cyber attack is better than detection and containment. Then why is the overwhelming majority of us doing detection and containment?…

Best Moments from “Hacking the Speed of GRC” Video Chat

Highlights from “Hacking the Speed of GRC” Video Chat. To watch the full video go here. I moderated a discussion on Friday, 05-08-20 with Scott…

[5-29-20] Hacking Zero Budget Security – CISO Series Video Chat

Join us Friday, May 29th, 2020 at 10 AM Pacific/1 PM Eastern for “Hacking Zero Budget Security: An hour of critical thinking about what you can…