All Posts

Defense in Depth: Proactive Security

How proactive should we be about security? What’s the value of threat intelligence vs. just having security programs in place with no knowledge of what…

REGISTER for CISO/Security Vendor Relationship Podcast Live in NYC 9/5/19

The CISO/Security Vendor Relationship Podcast returns to NYC for a live recording this September. This recording in front of a live audience will be co-hosted…

If Capital One Listened to Our Podcast They Still Would Have Been Breached

We guarantee listening to our show would have done absolutely nothing to prevent the Capital One breach. We’ve consulted our lawyers and we feel confident…

Black Hat 2019: THANKS to Fans from Mike and David of CISO/Security Vendor Relationship Podcast

Just a quick video from me and Mike Johnson, co-hosts of the CISO/Security Vendor Relationship Podcast, thanking fans for coming up to us and showing…

Defense in Depth: ATT&CK Matrix

Is the ATT&CK Matrix the best model to build resiliency in your security team? What is the best way to take advantage of the ATT&CK…

Improve Security by Hiring People Who Know Everything

If you’re having a hard time securing your infrastructure, then maybe you need to step up the requirements for expertise. Why not ask for everything?…

Defense in Depth: Hacker Culture

The hacker community needs a new PR campaign. Far too many people equate hacker with criminal. But hacker is a mindset of how one approaches…

Just Click “Accept” As We Explain Informed Consent

Even if you do give “informed” consent, do you really understand what we’re doing with your data? Heck, we don’t know what we’re going to…

Defense in Depth: Bad Best Practices

All professionals like to glom onto “best practices.” But in security, “best” practices may be bad out of the gate, become useless over time, or…

Who Are the Perfect Targets for Ransomware?

If you’ve got lots of critical data, a massive insurance policy, and poor security infrastructure, you might just be a perfect candidate to be hit…

Defense in Depth: Cyber Harassment

Whether a jilted lover or someone trying to wield their power over another, cyber harassment takes many forms and it doesn’t stay in the digital…

Passwords So Good You Can’t Help But Reuse Them

We’ve just fallen in love with our passwords we just want to use them again and again and again. Unfortunately, some companies more interested in…

Defense in Depth: CISO Series One Year Review

The CISO/Security Vendor Relationship Podcast is now more than a year old. On this episode, the hosts of both podcasts, reflect on the series and…

Please Don’t Investigate Our Impeccable Risk Predictions

It’s easy to calculate risk if no one ever checks the accuracy of those predictions after the fact. It’s all coming up on CISO/Security Vendor…

Defense in Depth: Economics of Data

Do we understand the value of our data? Do our adversaries? And is the way we’re protecting it making it too expensive for them to…

Worst Question Award Goes to “How Secure Are We?”

We’ve got better ways to determine the overall quality of your security posture than asking this unanswerable question. It’s all coming up on CISO/Security Vendor Relationship Podcast. This…

PREVIEW: CISO/Security Vendor Relationship Podcast Live in Sydney 07-25-19

The CISO/Security Vendor Relationship Podcast will be heading to Sydney, Australia on July 25th, 2019 for a live recording of the podcast at the ADAPT…

Defense in Depth: Tool Consolidation

While cybersecurity professionals always want more tools, more often than not they’re dealing with too many tools delivering identical services. The redundancy is causing confusion…

You’re Not Going Anywhere Until You Clean Up That Cyber Mess

Our CISOs and Miss Manners have some rules you should follow when leaving your security program to someone else. It’s all coming up on CISO/Security Vendor Relationship Podcast.…

Defense in Depth: Camry Security

The Camry is not the fastest car, nor is it the sexiest. But, it is one of the most popular cars because it delivers the…

We Take Privacy, Not Our CISO, Seriously

We’re looking for the one company brave/truthful enough to say they don’t care about privacy on the latest episode of CISO/Security Vendor Relationship Podcast. This…

Why Is This a Bad Pitch?

Here’s an excerpt from our live recording of the CISO/Security Vendor Relationship Podcast at the 2019 West Michigan IT Summit, hosted by C3 Technology Advisors.…

Defense in Depth: Amplifying Your Security Posture

In security, you never have enough of anything. But the scarcest resource are dedicated security people. When you’re running lean, what are some creative ways…

Do These Jeans Make My Vulnerabilities Look Too Big?

We’re starting to get a little self-conscious that our vulnerabilities are starting to show. People we don’t even know are telling us we have them…