Five Years Forward Inside a Zeitgeist of Transition

Discover future trends in tech and business for the next five years. Learn how CIO roles, digital ethics, and emerging technologies will redefine the landscape.
Threat Report: The State of Cybersecurity Today

Explore why current cybersecurity methods are failing and how the dark web and disinformation campaigns are shaping new threats. Stay ahead of risks.
Chinese Ambition and Our Existential Threat

Discover the risks of tech business in China. Learn how the Chinese Communist Party’s tactics impact US IP and cybersecurity. Act now, tomorrow may be too late.
Redteam Testing Is Critical but Results Require Action

Discover how a $3B restaurant chain’s oversight led to a major data breach. Learn key cybersecurity lessons to protect your business from similar risks.
Two Great Security Professionals Reflect on One Human Factor in Cybersecurity

Dive into a candid cybersecurity discussion with CISO Chris Roberts and Paige Thompson. Learn how COVID-19 exposes gaps in tech and human behavior.
We Spend Lavishly on Systems and Software-Centric Security but Nothing on Hardware – Why?

Discover hidden hardware vulnerabilities across major vendors. Learn how Sepio Systems fortifies your cybersecurity strategy with real-time threat prevention.
A Cybersecurity Education Proposal

Learn about the skills gap, policy failures, and the urgent need for a national strategy.
A Cybersecurity Education Conundrum

Discover why the U.S. is falling behind in cybersecurity education and learn about the skills gap and the urgent need for a national strategy.
Cybersecurity and Board Oversight: Bike-shedding Gets in the Way

Discover why board members lag in cybersecurity readiness and how this gap affects investment and compliance.
The Growing Threat from Connected Devices

Many cybersecurity analysts have warned of the rapidly emerging threat from an expanded IoT space. As you have noticed, it appears we are not only failing to improve our cybersecurity defenses, but recent data suggests we are falling even further behind while the bad guys are running ahead. We know that cybercrime is expected to […]
A Quantified Approach to Cybersecurity Risk Assessment

Explore why traditional Cybersecurity Risk Assessment methods fall short and how Value-at-Risk provides a real-time, dollar-based evaluation of cyber threats.
A Contextual Model of a Cognitive Risk Framework for Enterprise Risk Management

Discover how a Cognitive Risk Framework enhances enterprise risk management by blending behavioral science with advanced analytics, focusing on cybersecurity.
Fear and Loathing on the Chinese Supply Chain

Explore how compromised Chinese-manufactured motherboards affect global cybersecurity. Learn the risks posed to major companies like Amazon and Apple.
The Argument for Cybersecurity Fundamentals – and Outside Help

Discover why basic information security hygiene is crucial in defending against evolving cyber threats like Crypto jacking and Crypto mining.
Public and Private Sector Partnerships Addressing COVID-19 Are A Model for Cybersecurity

Covid-19 crisis has fostered unprecedented public-private partnerships to combat the pandemic, how this collaboration model can be applied to cybersecurity.
Being Prepared For a Pandemic or Not

Learn why Business Continuity Planning and Disaster Recovery must evolve to include unprecedented challenges like pandemics. Be prepared, be adaptable.
Ready For Third Party Risk Management?

Explore the underestimated risks of third-party digital relationships in cybersecurity. Learn why Boards and C-suite executives can’t afford to ignore this threat vector, and more.
The 4 Elements of a Cyber War, Part Four: Technology

In this final post, we discuss the most threatening and important attacker/defender asymmetry: Technology and future challenges for cyber professionals.
Equifax is Nowhere Near off the Hook

A closer review of the remaining class action suits against Equifax should give the parties of interest at Capital One a large dose of both fear and heartburn.
Inside the Mind of the Capital One Hacker

Following forensic analysis related to the Capital One breach, a spokesperson for the bank claimed the data had not been compromised for fraudulent purposes.
The 4 Elements of a Cyber War, Part One: Economics

We welcomed 2020 with the death of General Soleimani in Iran, a country known for its cyber prowess. There is now talk of cyber revenge targeting the United States.
Cybersecurity: 5 Key Revenue Drivers for 2020

Discover how cybersecurity can shift from a cost center to a profit center. Learn how robust data security can drive revenue and serve as a competitive differentiator.
AI: Rescuing Human Frailty from its own DNA

Our inability to match our adversary’s speed and cunning creates an opportunity for AI to assist in rescuing human frailty from its own DNA.
The 4 Elements of a Cyber War, Part Two: Information

In part two, we transition from discussing the economic complexities of cyberwarfare to exploring the critical role of Information in combating cyber threats.
Micro-Segmentation – The Endlessly Expanding Attack Surface

Navigate the complexities of cybersecurity and network segmentation. This blog offers expert insights on avoiding pitfalls and enhancing your security strategy.
The 4 Elements of a Cyber War, Part Three: Education

See the U.S.’s urgent need for robust cybersecurity education to combat highly trained global adversaries in part 3, highlighting the growing skills gap and calls for national action.
Cloud Security, not for the Faint of Heart

Navigate the complexities of cloud security in a breach-prone era. Learn about misconfigurations, shared responsibility, and key precautions for robust cloud security.
Access Authorization – A Severe Bout of Existential Techlash

Uncover the legal and ethical implications of Pegasus spyware’s WhatsApp breach. A deep dive into the battle between tech and government over digital surveillance.
Panicky Investors Issue Dire Warning On Coronavirus

Sequoia Capital warns startups about the economic impact of COVID-19. Should you pull back or double down? A look at risk, opportunity, and daring in uncertain times.