Featured Articles

Back to Vendor Listings

Security status unknown

Do CEOs and Boards have any idea what the company’s cybersecurity status is? Cybersecurity and privacy compliance should be a top priority of the Board of Directors and senior management of any publicly traded company, right? Not so fast, kemo sabe. The problem is, everyone thinks that their problems, their issues, their topics should be…

A seat at the table

I’m sometimes asked if I ever experienced difficulties being a woman in the male-dominated cybersecurity field. My answer: “I could write a book on it!” I remember very clearly an incident that took place in a former role when, as a cybersecurity professional, I had to deliver a presentation to a group of men at…

What would the enemy do?

To better train and prepare their company’s employees for cyber attacks, CISOs need to put themselves in the attackers’ shoes to anticipate their motives, means and actions. In a KnowBe4 webinar last week, hacker turned pentesting professional Kevin Mitnick talked about real-life cases of human vulnerability that threat actors could exploit for their benefit and…

Stay tuned for CISOs Investigate: Vulnerability Management

Vulnerabilities cannot be eliminated; they can only be managed. In Security Current’s upcoming report CISOs Investigate: Vulnerability Management, lead writer David Sheidlower (CISO for a construction company) and executive editor Bob Turner (CISO for a higher education institution) share their experiences and best practices in managing vulnerabilities for their organizations. The report also features seven…