The CISO as Communicator

The role of the CISO is evolving. It is no longer restricted to the technical aspects of ensuring that the organization is protected from external and internal attacks, and is no longer confined just to the IT room. With cybersecurity becoming more and more a strategic business issue, CISOs find themselves stepping up to the…

Details

Rogue mobile apps are common vectors of fraud attacks

Consumer fraud is increasingly committed via mobile phone applications, security firm RSA has revealed in its Quarterly Fraud Report. In its April 1-June 30, 2018 survey of global fraud trends, RSA detected 9,185 rogue mobile applications – a 13 percent increase from the previous quarter. Rogue apps made up 28 percent of observed attacks. “Fraudsters…

Details

Security Current Announces All-Star CISO Editorial Board to Set Direction for Peer-Driven Content

Security luminaries guide development of purposeful content and collaborative events for their executive peers Security Current today announced its executive-level Editorial Board that is guiding the development of the organization’s renowned content and events. Board members span a variety of industries, from financial services, design and manufacturing, healthcare, and retail to construction and professional sports.…

Details

Unconventional Controls in a Shifting Threat Landscape

In the information security space, conventional wisdom says there is a simple formula for putting controls in place to protect systems, applications, and the data that courses through them. According to the formula, you should select a risk framework and a set of authoritative sources, like NIST 800-53, ISO 27001, or the Common Security Framework…

Details

How to Talk About Salary When Looking for a New Job

Looking for a new job can be thrilling and stress-inducing at the same time. You want an opportunity that will challenge you and help you grow, but the process of landing an offer for your dream job can be tricky to navigate. For many people, one of the most vexing issues is how and when…

Details

Cyber Insurance: Who Needs It, and Why

Your business has invested heavily in cybersecurity efforts to safeguard the organization against a range of threats. These investments are largely seen as a way to reduce the financial risks to the business—reduce being the key word. All the technology solutions you implement and the user awareness training you do are not sufficient to completely…

Details

Privacy is Dead. Long Live Privacy

Former Oracle CEO Larry Ellison once famously said, “Privacy is Dead.” However, privacy had been resurrected and killed more times than a Tyrannosaurus Rex in a Spielberg sequel. A recent data breach https://www.wired.com/story/exactis-database-leak-340-million-records/ involving more than 340 million records of U.S. citizens demonstrates why privacy is dead. Again. It’s dead because you never heard of…

Details

Create Better Career Opportunities – Manage Your Reputation

You might be perfectly happy in your job right now, but at some point in your career, you might decide that it’s time for a change. Or perhaps your company will be acquired, and the decision for you to move on won’t necessarily be yours to make. Whatever the scenario, the time to prepare for…

Details

How to Assign a Monetary Value to a Security Solution

Over the years, I’ve counseled numerous information security leaders on how to assign a monetary value to a security solution. It’s important to be able to speak in terms of protecting asset value because that is the language of the board of directors and other executive leaders who must approve a significant expense. In many…

Details