New tools to enhance customer experience (CX) can come with baggage. While well-intentioned CX leaders see a beautiful wooden horse, tech leaders see the fall of Troy and their inevitable beheading. Risk and breaking working systems are concerns. For this…
Imagine someone locking you out of your own house, digging through your sensitive documents, and threatening to share this private information unless you pay them an exorbitant amount of money. For tech leaders, this is reality. Are you prepared to defend…
As a featured guest on the The CISO Insights podcast Jacob Friedman told of his first unpleasant experience in cyber security, the flaw in Gartner’s approach, and the emerging themes he sees in cybersecurity. Hosted by Misha Sobolev, the show…
When a client asked about the difference between secrets management and password vaulting, I realized his question was a good one. Our collective history of such a simple string of characters is one of pain, agony and frustration. There’s no…
The ChatGPT breach announced by OpenAI isn’t just their problem. It should be a top concern for CISOs. If anyone in your organization has used ChatGPT, you might be impacted. Your employees are likely testing ChatGPT to aid in various…
Our own tech scout Jacob Friedman was featured on InfoSecLive’s LinkedIn livestream and on YouTube today by Simon Linstead. Info-sec.live is a cybersecurity community that was launched in June 2021. It has grown to over 4000 members and is followed…
A free tool has been released by the Cybersecurity & Infrastructure Security Agency (CISA) called “Untitled Goose Tool” or Goose for short. CISA states that the free tool helps network defenders detect potentially malicious activity by assisting in data gathering…
Hackers primarily target your organization in one of two ways: they jiggle millions of “doorknobs” per second or engage in a targeted attack. One targeted attack method is a phishing or BEC (business email compromise) attack. CISOs are well-acquainted with…
What is a Group Policy? It’s the method by which many IT execs update and apply security and configuration settings to groups of machines throughout their network. On the surface, it’s considered a proactive and efficient way to secure and…
SASE was created to address two primary concerns. Organizations using SD-WAN solutions needed better security, and VPNs were becoming increasingly bottlenecked. So, what is SASE? As organizations tried to integrate Cloud Security providers like ZScaler for SWG and Netskope for CASB…