Creating a strong security program in a product shop is tough. In a setting where quick movement and fast production is the key driver of revenue, security can feel like a drag on innovation. But there are ways to align security strategies in a smoother and more efficient way. The …
The ’53-Man’ Roster for Security (Part 3 of 3)
Welcome back! My Eagles won again and beat an undefeated Tampa Bay team with a great defense, on the road, which was awesome. Miami absolutely destroyed Denver to the point where the Broncos should be called the Denver Foals. Ouch. We’re all scratching our heads as to how the Rams …
The ’53-Man’ Roster for Security (Part 2 of 3)
Welcome back! Football’s second week did not disappoint at all…my Eagles found another way to win despite an anemic offense, the Bengals lost a heartbreaker at home, the 49ers are starting to look unstoppable, and the Giants, Steelers, and Chiefs all proved that fortunes could change on any given Sunday. …
The ’53-Man’ Roster for Security (Part 1 of 3)
Those who know me know this is my favorite time of the year – American football season has begun. Without question I’m a football enthusiast, most people (including my wife) would describe me as a fanatic. I love the sport, and I have since I was 6. I love its …
Dear Congress, We need a privacy law.
In an age dominated by rapid technological advancements, data has become the new currency, reshaping the way we interact, communicate, and conduct business. In the United States, where I call home, the lack of comprehensive privacy laws has raised concerns about the protection of personal information and the potential for …
Cyberweek 2023: Israel
Israel is a pretty amazing country, and I was privileged to join some of our nation’s top cybersecurity executives on a delegation to CyberWeek through CISOs Connect™, one of the best invitation-only societies for cybersecurity executives and practitioners. (Note: I am both a board member of CISOs Connect™ and a …
Security shouldn’t be the department of “No”.
It’s our job to understand what users need, and to make sure they can do their jobs with our help. But instead, cyber security teams have won the reputation of trying to block business requests rather than develop methods and technologies to facilitate them. Businesses aren’t static, and neither are …
Device Hygiene: More Crucial Than Ever
LastPass recently disclosed that its massive data breach last year happened because a hacker was able to install malware on an engineer’s home computer.The engineer had access to the company’s cloud storage on his personal machine, which also ran an unpatched movie server. For me, the breach was the final …