Jul 11Member-only3 Tips to Maximize Cybersecurity ValueDelivering maximum value is a momentous challenge for cybersecurity organizations. It takes a decisive effort to organize and prioritize the proper goals that are meaningful to the business, and establish operational excellence to deliver effectiveness and efficiency. But running a good risk program that manages the defensive posture by…Cybersecurity3 min read
Jul 7Member-onlyCybersecurity Vault #9 with Min Kyriannis — Dangers of MisinformationHad a great time talking with Min Kyriannis about the dangers of misinformation and how to begin disentangling the online web of lies and half-truths!Technology1 min readCybersecurity Vault #9 with Min Kyriannis — Dangers of MisinformationHad a great time talking with Min Kyriannis about the dangers of misinformation and how to begin disentangling the online web of lies and half-truths!----
Jul 7Member-onlyTech and Cybersecurity Featured in Global Leaders Today MagazineTechnology leadership is crucial to how the world lives, works, communicates, and innovates. As Global Leaders Today magazine features tech leaders in its latest issue, I am happy to see they included cybersecurity in the mix. …Leadership1 min read
Jun 27Member-onlyBiggest Challenge in CybersecurityConveying the meaningful value of cybersecurity investments In the next few years, the biggest challenge in cybersecurity won’t be dealing with a specific threat, but rather conveying a meaningful value proposition throughout the organization, and especially to the C-suite and board. It is key to the sustainability of cybersecurity and perhaps our biggest blind spot! Articulating…Cybersecurity2 min read
Jun 24Member-onlyAmazon Alexa to Mimic the Voice of AnyoneEthical and Privacy issues abound. If a malicious actor combines an impersonated voice and deepfake video of a target, they can make others believe anything or harass them in unthinkable ways. We already have a deepfake problem, this compounds the issues greatly. Even in Amazon’s use-case of keeping memories alive…Alexa1 min read
May 16Member-onlyValue is the Cybersecurity Blind SpotSpeaking at the SPHERE22 ConferenceCybersecurity1 min readValue is the Cybersecurity Blind Spot----
May 10Member-onlyUS Sanctions Blender.io for Supporting TerrorUS Treasury sanctions a cryptocurrency mixing site for supporting North Korean hackers who have been stealing hundreds of millions of dollars. Blender.io is a virtual currency mixing site that obfuscates the origins of cryptocurrency coin transactions. Mixing services are privacy tools that malicious entities can also use for laundering illicit…Cybersecurity1 min read
May 1Member-onlyRansomware is Funding Russian AggressionRansomware attacks and payments are increasing, with most revenue going to Russian attackers. It is time to revisit outlawing Ransomware payments. Some stats to hammer the situation home: Sophos ransomware report indicates: - Ransom attacks are more frequent (66% of surveyed orgs indicated they were hit with ransomware in 2021…Cybersecurity1 min read
Apr 28Member-onlyHow Cybersecurity Risks Must Be Fixed to Build Trust in Technology InnovationThanks to DynamicCISO for a great discussion about the changing landscape of cybersecurity and how we must all adapt to drive trust into…Cybersecurity1 min readHow Cybersecurity Risks Must Be Fixed to Build Trust in Technology Innovation----
Mar 9Member-onlyIt is Time for the West to Supply Quantities of Lethal Drones to UkraineThe war in Ukraine is grinding down to a slugfest where innocent civilians will suffer ever greater impacts. The defenders need a combat advantage over their larger opposition. Supplying anti-tank and shoulder-fired air defense missiles are helpful, but not decisive. Plans to provide more powerful weapons, like fighter/attack aircraft, take…Ukraine2 min read