Tag "CISO"

Back to homepage
Industry Insights

Hack like a CISO

Developing the security officers’ processes, strategies and techniques for managing their time, resources and teams.I have written several times over the last couple of years about how the role of

Industry Insights

Security by Design – Future-Proof

How does one “future-proof” a security program? What does “future-proof” even mean? “Future Proof” refers to an organization, business, program or product that performs all of the right jinks (moves)


Zero login: Fixing the flaws in authentication

Passwords, birth certificates, national insurance numbers and passports – as well as the various other means of authentication, that we have relied upon for the past century or more to


File-Based Malware: Considering A Different And Specific Security Approach

The cybersecurity solutions landscape has evolved from simple but effective signature-based scanning solutions to sandboxing—the isolating layer of security between your system and malware—and, most recently, to sophisticated detection methods.

Industry Insights

Half of businesses ignore future cyber threats

Many firms are too busy fighting current cyber threats to plan for the future. Businesses are too busy fighting current cyber-threats to focus on what might be around the corner, new research

Industry Insights

Not enough CISOs and business leaders cooperate on a cybersecurity plan and budget

With the proliferation of more and more sensitive data, expanding connectivity, and the adoption of automated processes, new research from Accenture reveals that C-suite and IT decision makers need to embrace a


Innovation in healthcare: A hacker’s dream and CISO’s nightmare?

It’s hard not to be excited about artificial intelligence and machine learning in pure technology terms, but applying these innovations to the healthcare sector has the potential to do truly great things

Industry Insights

Could understanding the technical debt hold the key to improving cyber security?

Charl van der Walt, chief security strategy officer at SecureData, explains why a change of thinking is needed to improve cyber security strategies. The most important thing to do is


How to allocate budget for a well-rounded cybersecurity portfolio

Getting the C-levels to approve an IT security budget is probably one of the most difficult and exasperating tasks that security professionals and IT managers have to do each year.


Rules automation puts the “Sec” in DevSecOps

Imagine if safety were an afterthought in automobiles: Manufacturers would create a pristine new car and then hand it off to the safety team…which would bolt airbags onto the dashboard,