- Leadership Cybersecurity: No Longer the "Department of No"
For security teams to remain relevant and helpful, they must evolve from being blockers to business enablers who find ways to say "yes." Building relationships with business executives and...
- Leadership How to Ask Questions to Succeed with Security Projects
Asking the right questions is a critical skill for security professionals, whether planning projects, discovering requirements, or persuading stakeholders. By using constructive inquiry techniques,...
- Leadership What's It Like for a New CISO?
Transitioning into a CISO role involves forming an information security program, justifying cybersecurity purchases with business-relevant details, and addressing practical challenges like enabling...
- Leadership Joining Axonius to Tackle Cybersecurity Asset Management
IT asset management is a foundational security challenge that organizations increasingly struggle to address as modern paradigms like DevOps, IoT, and BYOD complicate tracking systems, devices, VMs,...
- Malware Making Sense of Microsoft's Endpoint Security Strategy
Microsoft is pursuing three endpoint security objectives: protecting the OS through baseline measures, motivating other vendors to innovate beyond commodity controls, and expanding enterprise revenue...
- Communication Cyber is Cyber is Cyber
The distinction between "cybersecurity" and "information security" is becoming academic as the world embraces "cyber" as the dominant term. Since non-specialists relate more to "cyber," security...