- Leadership How to Ask Questions to Succeed with Security Projects
Asking the right questions is a critical skill for security professionals, whether planning projects, discovering requirements, or persuading stakeholders. By using constructive inquiry techniques,...
- Leadership What's It Like for a New CISO?
Transitioning into a CISO role involves forming an information security program, justifying cybersecurity purchases with business-relevant details, and addressing practical challenges like enabling...
- Leadership Joining Axonius to Tackle Cybersecurity Asset Management
IT asset management is a foundational security challenge that organizations increasingly struggle to address as modern paradigms like DevOps, IoT, and BYOD complicate tracking systems, devices, VMs,...
- Malware Making Sense of Microsoft's Endpoint Security Strategy
Microsoft is pursuing three endpoint security objectives: protecting the OS through baseline measures, motivating other vendors to innovate beyond commodity controls, and expanding enterprise revenue...
- Communication Cyber is Cyber is Cyber
The distinction between "cybersecurity" and "information security" is becoming academic as the world embraces "cyber" as the dominant term. Since non-specialists relate more to "cyber," security...
- Communication Communicating About Cybersecurity in Plain English: Haiku!
Security professionals often use language that guarantees their message will be ignored or misunderstood by non-technical audiences. Translating jargon-heavy policy text into sentences of no more...