Cory Simpson, former Senior Director at the U.S. Cyberspace Solarium Commission and international expert on national security and emerging technology, has joined Resolute Strategic Services as an Executive Vice President.
You want to begin implementing zero trust security at your organization, but where do you start? Let's walk through clear stages to build a zero trust framework that serves as the roadmap for your organization’s journey to better security and greater efficiency.
Assessing cyber risk is essential to a business and is a key contributor to its overall reputational risk. Businesses need to take cyber risk into account in overall business strategy and planning.
Chris Jacquet, VP and Chief Information Security Officer (CISO) at Hitachi Vantara, explains how best to approach cybersecurity in the boardroom. Being prepared, honest and concise can help a CISO secure much-needed funding for their department.
Whether remote, in the office or in a co-working space, all employees must be sensitized to cyber threats. It is important not only to provide training for employees but also to give IT security a permanent place in the corporate culture.
Despite a company’s belief on how it would respond in the event of a ransomware attack, companies should consider opening a bitcoin account with a nominal amount of bitcoin in it so that it is at least prepared to make the tough decision should the need arise.
Alex Jadrich, the Security Operations Manager at the Denver Zoo, outlines how physical security professionals can proactively mitigate risk by instituting an enterprise risk management program in their organization. In a presentation at the IFCPP's 22nd Annual Conference, Jadrich highlights the benefits of enterprise risk management for physical security.
The recent pandemic accelerated a trend towards remote work that has been ongoing for years and, as a result, accelerated usage of cloud-based collaboration platforms and their impact on the field of digital forensics. This article will discuss the trends and challenges associated with these platforms as they pertain to cloud-based data collection and its use in forensic investigations.
We spend a lot of time and effort so we can spot attackers —
and for a good reason! But without visibility into our own organizations, we’re left with too much uncertainty. So how can you use more visibility to counter the fog of war?
In this installment of the Cybersecurity and Geopolitical Podcast, Ian Thornton-Trump (CISO at Cyjax) and Tristan de Souza retrospectively look at the inaugural International Cyber Expo in London, discussing data breaches, the role of a CISO and more.