Monthly Archives :

September 2017

Cybersecurity Auditor

Cybersecurity Auditor – The Inspector

Cybersecurity Auditor – The Inspector 864 486 N2K

Updated April 8th, 2020 What does it mean to be a Cybersecurity Auditor? In order to preserve the integrity of…

read more
Cybersecurity Architect

Cybersecurity Architect – The Mastermind

Cybersecurity Architect – The Mastermind 864 486 N2K

Updated April 8th, 2020 What does it mean to be a Cybersecurity Architect? In cybersecurity, many roles are definitively specialized.…

read more

Equifax – What Were They Thinking?

Equifax – What Were They Thinking? 864 486 N2K

Equifax – What Were They Thinking? Or rather, what do you hope the Equifax board was thinking in March, May,…

read more
Malware Analyst

Malware Analyst – The Bomb Squad

Malware Analyst – The Bomb Squad 864 486 N2K

Updated April 8th, 2020 What Does It Mean To Be A Malware Analyst? Imagine the detonation of an explosive digital…

read more
The great password debate part 3

The Great Password Debate Part 3 – Where we disagree about password resets and failures

The Great Password Debate Part 3 – Where we disagree about password resets and failures 864 486 N2K

“This post is part three of our reaction to new recommendations in the National Institute of Standards’ Digital Identity Guidelines…

read more

The Value of Cybersecurity Tabletop Exercises for Leadership Teams

The Value of Cybersecurity Tabletop Exercises for Leadership Teams 864 486 N2K

The lessons learned from cybersecurity tabletop exercises will minimize the impact of your organization’s next data breach. If the adage…

read more
Vulnerability Mgt Analyst

Vulnerability Management Analyst – The EMT

Vulnerability Management Analyst – The EMT 864 486 N2K

Updated April 8th, 2020 What does it mean to be a Vulnerability Management Analyst? The cliche, “You are only as…

read more

How to Calculate ROI on Cybersecurity Investment

How to Calculate ROI on Cybersecurity Investment 864 486 N2K

By Tom Kellermann, CEO, Strategic Cyber Ventures As a Chief Information Security Officer, you have the unenviable responsibility of presenting…

read more

The Farmer and the Equifax

The Farmer and the Equifax 727 409 N2K

The Farmer and the Equifax In the wake of the Equifax consumer data breach, many of the stories in the past days share…

read more

How Not To Be One of the Six Million Instagram Hacked Accounts

How Not To Be One of the Six Million Instagram Hacked Accounts 864 486 N2K

How Not To Be One of Six Million Instagram Hacked Accounts What Happened? Instagram, social media’s beloved photo and video…

read more