Kevin
-
Recent Posts
- “Harmonizing the Digital Symphony: The Essential Role of Cybersecurity Detection Engineers in Safeguarding Cyber Landscapes”
- Cybersecurity Deception Engineers: The Unseen Guardians of Cybersecurity Programs and the Unsung Heroes in the Battle Against Cyber Threats
- Offense for Defense: The Art and Science of Cybersecurity Red Teaming
- DEFENSE IS THE BEST OFFENSE: THE EVOLVING ROLE OF CYBERSECURITY BLUE TEAMS AND THE IMPACT OF SOAR TECHNOLOGIES
- SECURING CORPORATE IoT DEVICES: CHALLENGES, STRATEGIES, AND THE ROLE OF AI AND ML IN CYBERSECURITY
Archives
-
Monthly Archives: April 2018
Small and Medium Size Organizations at Risk
The bad guys are now starting to target mid-tier companies with their hacking activities. In many cases these companies have not yet come to realize that having a Certified Chief Information Security Officer (C|CISO) or a Virtual Cerified|CISO (vC|CISO) is … Continue reading
Posted in Uncategorized
Tagged Application Security, compliance, cyber, cyber security, Cyber Security Incident Response, Incident Response, information assurance, information security, Information Security Policy, information system security, Information Technology, ISO, IT, leadership, risk, risk assessment, risk management, Security
Leave a comment