CISO Insights

Back to Vendor Listings

A Road Map for CISOs

The role of the CISO has evolved greatly over the years. Over the past 20 years leading security practices across multiple industry verticals for large Fortune 500 organizations, I have observed first hand its various shifts. The natural next question is what the next phase would look like. More importantly, will the CISOs of today…

A Modest Proposal to Eliminate (or Modify) Breach Disclosure Laws

by Mark Rasch Google recently disclosed the fact that a vulnerability in its Google Plus configuration could have been used by hackers to expose personal information about users of the Google Plus service. (https://www.nytimes.com/2018/10/08/technology/google-plus-security-disclosure.html) Indeed, Google announced that it was shutting down the service as a result of the hack. That’s not what outraged the…

The Attacks of the Future

What might the most damaging attacks of the future look like? The answer to the question may lie somewhere between the known patterns that attackers have established over the years, and signs that we are starting to see today. A look back It started with the sun and the moon. Solar Sunrise was discovered in…