How to Talk About Salary When Looking for a New Job

Looking for a new job can be thrilling and stress-inducing at the same time. You want an opportunity that will challenge you and help you grow, but the process of landing an offer for your dream job can be tricky to navigate. For many people, one of the most vexing issues is how and when…

Details

Cyber Insurance: Who Needs It, and Why

Your business has invested heavily in cybersecurity efforts to safeguard the organization against a range of threats. These investments are largely seen as a way to reduce the financial risks to the business—reduce being the key word. All the technology solutions you implement and the user awareness training you do are not sufficient to completely…

Details

Privacy is Dead. Long Live Privacy

Former Oracle CEO Larry Ellison once famously said, “Privacy is Dead.” However, privacy had been resurrected and killed more times than a Tyrannosaurus Rex in a Spielberg sequel. A recent data breach https://www.wired.com/story/exactis-database-leak-340-million-records/ involving more than 340 million records of U.S. citizens demonstrates why privacy is dead. Again. It’s dead because you never heard of…

Details

Create Better Career Opportunities – Manage Your Reputation

You might be perfectly happy in your job right now, but at some point in your career, you might decide that it’s time for a change. Or perhaps your company will be acquired, and the decision for you to move on won’t necessarily be yours to make. Whatever the scenario, the time to prepare for…

Details

How to Assign a Monetary Value to a Security Solution

Over the years, I’ve counseled numerous information security leaders on how to assign a monetary value to a security solution. It’s important to be able to speak in terms of protecting asset value because that is the language of the board of directors and other executive leaders who must approve a significant expense. In many…

Details

Aqua Security and LogicHub Tie as Winners of Security Current’s Security Shark Tank® During RSA 2018

CISOs from across industries selected Aqua Security and LogicHub as the winners of Security Current’s Security Shark Tank® during RSA 2018. The event brought security solutions providers face-to-face with CISO buyers. Participating vendors were given 15 minutes each to pitch their solution in a rapid-fire question and answer format to a panel of information security…

Details

What a CISO Needs to Know about Cybersecurity and the Law: Privacy, Trends, and the Vagaries of Cyber Law

One of the fiduciary responsibilities that CISOs and their fellow C-suite executives have is to ensure that their organization abides by all laws and government regulations pertaining to their business. Failure to follow the letter of the law – or a federal regulation, which operates with the same force and effect as a law passed…

Details

It’s 10 PM. Do You Know Where Your Data Is? By Mark Rasch

This morning, the United States Supreme Court heard oral argument on a case that could decide the fate of the Cloud, the Internet, and the fate of the free world. Or not. The case deals with the thorny issue of “data sovereignty,” that is, whether the location of the data impacts the ability of governments…

Details