- Leadership Return on Investment (ROI) - A Touchy Security Topic
ROI in finance means income-generating return, but security prevents loss rather than creating wealth. Vendors misuse "ROI" to justify expenses as "investments." ROSI calculations rely on annualized...
- Social Networking Etiquette Tips for Social Receptions at Conferences
Practical etiquette tips for getting the most out of social receptions at conferences while creating a welcoming atmosphere for others.
- Leadership 5 Bad Habits of Cybersecurity Professionals
Activity doesn't guarantee progress. Security teams keep falling into five habits that look productive, but leave our programs no stronger than before.
- Malware Computer Threats Evolve Towards Focused, Nimble Tactics
Modern intrusions increasingly use well-planned, nimble, focused strategies rather than brute-force attacks alone. Attackers study business inner-workings to locate valuable data—scraping card...
- Social Engineering Attackers Are Attracted to Email Like Flies to Honey
Email contains business plans, credentials, and sensitive data that attackers harvest after compromising systems—either from local PST files or directly from Exchange servers. Mitigations include...
- Tools Breaking Down the Walls Between Application and Infrastructure Security
Application and infrastructure security often reside in separate teams with different skill sets, leading to gaps. Unify responsibilities under common leadership, include both in penetration tests,...