Top 10 Ways to be Better Prepared for the Next Crisis

If we can say nothing else about this crisis, it has been a paradigm shifting moment for most of us. Just about everything we thought we knew about what “normal” life is, has been disrupted and tested for strength. In many cases we have embraced the best and worked hard ...
Looking Forward

The news for security from the 2020 World Economic Forum Risks Report is really a simple as it gets, the 4th industrial revolution (4IR) is upon us, and the opportunities and benefits for the world are amazing and here to stay. The report indicates that “50% of the world...
Communication in a Time of Crisis

In any crisis, there are actions that will be managed through your crisis management plan, including crisis communications. The current global crisis has tested many organizations’ plans and no doubt has created many lessons learned on those plans’ effectiveness.
The Impact of the new Chinese Cybersecurity Law

That is the question business leaders are asking themselves across the world in light of the new version of China’s Multi-Level Protection Scheme law, known as MLPS 2.0, another Chinese cybersecurity regulation that comes into effect December 1, 2019. An expansion on the...
The Top 3 Cyber Security Risks Every Chief Marketing Officer Should Care About

The Chief Marketing Officer (CMO in many organizations) is on the front lines of two of the largest battle fronts in business today: business brand and customer data. And success or failure on those fronts is increasingly determined by the security of the technology that...
Digital Comes of Age

For the past millennia or so, the traditional approach to securing assets has been the utilization of a castle mentality. Make assets hard enough to get to, with many layers of protection, and you will be safe. In reality this is very difficult to achieve because it reli...
A True Paradigm Shift in Security Management

"Cyber Security 1.0” was vulnerability based, and has what I would argue limited and decreasing levels of success as public breaches continue at a record pace even though IT and IT security spending continues to be an increasing leadership and spending priority. The prob...
The Geek Shall Inherit the Earth…

At least according to Microsoft a few years ago, and if that’s true then the earth will be led by a new breed of technology leader…I call them the “Alpha Geek”. In a room full of Alpha Males or Females you can quickly find him or her by listening carefully, they are spea...
IT Sales “Professionals” and Common Sales Tactics

I don’t want this to sound like a rant, but after four years in the Silicon Valley being bombarded by “sales professionals” and “account executives” of technology firms, I must say I find them generally to be wanting…
The SolarWinds SUNBURST Supply Chain Attack

Over the past few weeks, a number of high-profile cyber-attacks have been made public.  First was the FireEye breach where a sophisticated threat actor managed to compromise one of the world’s leading cybersecurity and incident response firms and stole about 300 propriet...
Top 10 Ways to be Better Prepared for the Next Crisis

If we can say nothing else about this crisis, it has been a paradigm shifting moment for most of us. Just about everything we thought we knew about what “normal” life is, has been disrupted and tested for strength. In many cases we have embraced the best and worked hard ...
Looking Forward

The news for security from the 2020 World Economic Forum Risks Report is really a simple as it gets, the 4th industrial revolution (4IR) is upon us, and the opportunities and benefits for the world are amazing and here to stay. The report indicates that “50% of the world...
Communication in a Time of Crisis

In any crisis, there are actions that will be managed through your crisis management plan, including crisis communications. The current global crisis has tested many organizations’ plans and no doubt has created many lessons learned on those plans’ effectiveness.
The Impact of the new Chinese Cybersecurity Law

That is the question business leaders are asking themselves across the world in light of the new version of China’s Multi-Level Protection Scheme law, known as MLPS 2.0, another Chinese cybersecurity regulation that comes into effect December 1, 2019. An expansion on the...
The Top 3 Cyber Security Risks Every Chief Marketing Officer Should Care About

The Chief Marketing Officer (CMO in many organizations) is on the front lines of two of the largest battle fronts in business today: business brand and customer data. And success or failure on those fronts is increasingly determined by the security of the technology that...
Digital Comes of Age

For the past millennia or so, the traditional approach to securing assets has been the utilization of a castle mentality. Make assets hard enough to get to, with many layers of protection, and you will be safe. In reality this is very difficult to achieve because it reli...
A True Paradigm Shift in Security Management

"Cyber Security 1.0” was vulnerability based, and has what I would argue limited and decreasing levels of success as public breaches continue at a record pace even though IT and IT security spending continues to be an increasing leadership and spending priority. The prob...
The Geek Shall Inherit the Earth…

At least according to Microsoft a few years ago, and if that’s true then the earth will be led by a new breed of technology leader…I call them the “Alpha Geek”. In a room full of Alpha Males or Females you can quickly find him or her by listening carefully, they are spea...
IT Sales “Professionals” and Common Sales Tactics

I don’t want this to sound like a rant, but after four years in the Silicon Valley being bombarded by “sales professionals” and “account executives” of technology firms, I must say I find them generally to be wanting…

Subscribe

Let's stay in touch!
1
2