Embark on a captivating journey through the complexities of cybersecurity and human behavior, where anecdotes of missed context, unexpected encounters, and security dilemmas converge to unveil invaluable insights. Our narrative begins with a recou
Embark on a captivating journey through the complexities of cybersecurity and human behavior, where anecdotes of missed context, unexpected encounters, and security dilemmas converge to unveil invaluable insights. Our narrative begins with a recou
Embark on a riveting journey through the dynamic realms of emergency response, cybersecurity innovation, and strategic planning, guided by the insightful reflections of Dan Lurman, former Chief Security Officer for the state of Michigan. Our nar
Embark on a riveting journey through the highs and lows of cybersecurity preparedness, guided by insightful anecdotes and real-life experiences. Our narrative begins with a nod to the iconic film "Live Free or Die Hard," drawing parallels to the i
Embark on a fascinating journey with an individual whose diverse background encompasses a rich tapestry of faith, intellectual curiosity, and a deep-rooted passion for cybersecurity. Raised in a household where the echoes of Lutheran and Presbyt
In the ever-evolving landscape of business and technology, the prospect of industry consolidation looms large, driven by predictions and market trends. As organizations navigate these uncertainties, comprehensive scenario planning emerges as a vit
In the ever-evolving landscape of cybersecurity, seasoned professionals offer invaluable insights into emerging trends, challenges, and strategies. In this blog post, we engage in a conversation with Dan, an experienced security expert, as he shar
The intersection of cybersecurity and ethics is a topic of increasing relevance in today's digital landscape. In this blog post, we delve into a conversation with a seasoned professional who shares insights from his extensive experience and explores
Handling crises, whether natural calamities or cyber emergencies, requires preparedness, agility, and resilience. In this blog post, we delve into real-life experiences shared by Dan, a seasoned security professional, highlighting pivotal moments
Welcome to RSA Conference 2024 in San Francisco, where the latest in application security (AppSec) awaits! To help you navigate the expo efficiently, we've curated a list of top companies based on booth locations. Follow this strategic path to cover
Are you there at RSA Conference 2024? With so many innovative cybersecurity companies exhibiting, planning your visit strategically can ensure you make the most out of your time at the event. To help you navigate efficiently, we've compiled a list of
Are you attending RSA Conference 2024? To make the most of your time at RSAC, we've curated a list of leading application security (AppSec) companies categorized by booth location. Follow this guide to navigate efficiently and connect with these inno
In the high-stakes cybersecurity arena, enterprises continually seek innovative strategies to safeguard their digital assets against evolving threats. Traditionally, security assessments have relied on periodic penetration testing and red team exerci
Gartner says “CTEM is defined as a set of processes and capabilities that allows enterprises to continually and consistently evaluate the a
This year, virtual CISOs must begin making a difference in our industry. For the longest time, small and medium businesses (SMBs) have been abandoned by the cybersecurity industry. But, SMBs need security leaders to guide them through the maze of cyb
In the landscape of ever-evolving cyber threats, how can organizations safeguard their digital assets with efficacy and speed? Continuous threat exposure management (CTEM) stands out as the proactive cybersecurity frontier. This real-time strategy tr
The Cybersecurity Vault — episode 32, with guest Ian Thornton Trump.
In this episode, we discuss one of the most divisive and contentious topics in cybersecurity — should victims of ransomware be allowed to pay the cybercriminals?
With the continuing r
In the fast-paced world of cybersecurity, the role of a Chief Information Security Officer (CISO) is akin to that of a guardian of the digital realm. However, behind the scenes, this position often comes with an overwhelming burden that can lead to b
In the fast-evolving landscape of cybersecurity, the demands and expectations from technology leaders continue to grow. A vivid illustration of this dynamic is the intense conversation between Dan, a Chief Information Security Officer (CISO) in Mi
In a thought-provoking conversation, Daniel discusses the ever-evolving landscape of cybersecurity, emphasizing the need for continuous improvement in combating cyber threats. As 2021 unfolds, he shares insights into emerging technologies and trends
In a comprehensive discussion, the importance of diverse expertise and scenario-based planning in cybersecurity tabletop exercises is highlighted. Emphasizing the significance of involving key leadership roles from various sectors, the conversation u