You are not the weakest link
I’ve been going through recaps of recent cyber-attacks and have seen more than one reference to people as being the weakest link. I’m tired of this excuse. All the tech we use is built by humans, or built by ro...
MGM Attack – If it happened so fast, why is anyone spending so much on cybersecurity?
Where does this leave you? If an organization like MGM, and so many others can’t stop these attacks, why would you invest in cybersecurity?
Building Trust as a Service Provider – It’s a process
In cybersecurity, we continuously use the word "trust" in all kinds of contexts: trusted partner, zero trust, digital trust, and more. But what does it mean for you?
Why AI fails spectacularly at cybersecurity
If Artificial Intelligence is so powerful, why are cybersecurity vendors offering human threat hunting as an additional service?
Cybersecurity Acronym Soup
LinkedIn presents an endless list of concerns and complaints about the ongoing evolution of cybersecurity acronyms. But, to be honest, new acronyms do little to highlight a solution's function. Take XDR, its function is as clear as mud. To shed some light on the alphabet soup of acronyms, I put together a list of [...]
Cybersecurity: The Need To Find Common Ground
According to Colonial Pipeline CEO Tim Felt, paying ransom for the return of his company’s data was the hardest thing he had to do. However, the ransom represented less than two days of revenue, based on $1.3B generated by Colonial Pipeline in 2020. Unmanaged System Leaves Colonial Exposed The source of the breach was a virtual private network (VPN) account for a system that was supposedly no longer in [...]