- Leadership What's It Like for a New CISO?
Transitioning into a CISO role involves forming an information security program, justifying cybersecurity purchases with business-relevant details, and addressing practical challenges like enabling...
- Leadership Joining Axonius to Tackle Cybersecurity Asset Management
IT asset management is a foundational security challenge that organizations increasingly struggle to address as modern paradigms like DevOps, IoT, and BYOD complicate tracking systems, devices, VMs,...
- Malware Making Sense of Microsoft's Endpoint Security Strategy
Microsoft is pursuing three endpoint security objectives: protecting the OS through baseline measures, motivating other vendors to innovate beyond commodity controls, and expanding enterprise revenue...
- Communication Cyber is Cyber is Cyber
The distinction between "cybersecurity" and "information security" is becoming academic as the world embraces "cyber" as the dominant term. Since non-specialists relate more to "cyber," security...
- Communication Communicating About Cybersecurity in Plain English: Haiku!
Security professionals often use language that guarantees their message will be ignored or misunderstood by non-technical audiences. Translating jargon-heavy policy text into sentences of no more...
- Training Writing Tips for IT Professionals
Technical writing requires understanding your readers' expectations and keeping messages as short and simple as possible to achieve objectives. Key practices include deleting unnecessary words,...