☰

Lenny Zeltser

  •  
Close
  • Information Security
  • Technology
  • Malicious Software
  • Cloud Services Research
  • Consulting Research
  • Toy Chest
  • Blog
  • About
  • Contact
  • Search
Close

Withholding Single Sign-On from SaaS Customers is Bad for Business and Security

Despite years of public shaming by security professionals, some SaaS vendors only offer Single Sign-On (SSO) in high-end...

Read more

Three Ways CISOs Can Drive More Meaningful Collaboration

Today’s CISOs are more than technologists—we strive to make ourselves well-rounded business leaders. This involves...

Read more

Let’s Address the Cybersecurity Careers Gap

Too many people are unsure how to enter or grow in the cybersecurity industry. It's a relatively young field, and we...

Read more

As a CISO, Are You a Builder, Fixer, or Scale Operator?

When contemplating the next step in your career as a cybersecurity leader, understand what you do best and what you enjoy...

Read more

Untangling the Complexity of SaaS Ownership in the Enterprise

Before SaaS, employees had to rely on IT and other teams to procure software, which gave the organization a direct way of...

Read more

Shift Your Mindset from Conflict to Collaboration to Succeed in Security

In the two decades I've spent in cybersecurity, I've observed and experienced the fighting spirit of security...

Read more

Cybersecurity: No Longer the “Department of No”

Cybersecurity leaders not only go against threat actors to defend the organization but also find themselves at odds with...

Read more

How to Ask Questions to Succeed with Security Projects

No matter the years of experience in cybersecurity, security professionals are often in situations where crucial details...

Read more

How You Can Start Learning Malware Analysis

Malware analysis sits at the intersection of incident response, forensics, system and network administration, security...

Read more

REMnux Tools List for Malware Analysis

REMnux® offers a curated collection of free tools for reverse-engineering or otherwise analyzing malicious software. How...

Read more

Copyright © 1995-2023 Lenny Zeltser. All rights reserved.