Hackers primarily target your organization in one of two ways: they jiggle millions of “doorknobs” per second or engage in a targeted attack. One targeted attack method is a phishing or BEC (business email compromise) attack. CISOs are well-acquainted with…
As a CXO if you haven’t noticed, increasing speed and customer experience convenience is a race. Customer access to sophisticated self-serve tools is no longer a nice surprise but a minimum expectation when doing business with you. To keep up,…
Some consider drones a nuisance, while others fly them recreationally. Most of us agree they have great potential, especially in the commercial space, but have you wondered why the solutions we have access to are limited and why such cutting-edge…
What is a Group Policy? It’s the method by which many IT execs update and apply security and configuration settings to groups of machines throughout their network. On the surface, it’s considered a proactive and efficient way to secure and…
SASE was created to address two primary concerns. Organizations using SD-WAN solutions needed better security, and VPNs were becoming increasingly bottlenecked. So, what is SASE? As organizations tried to integrate Cloud Security providers like ZScaler for SWG and Netskope for CASB…
What are the differences between Secure Access Server Edge (SASE) and Secure Service Edge (SSE), what use cases do they solve, and most importantly, how does SASE or SSE help your organization? In 2010, the world was a different place….
What is a decryption key? How is it used? And most importantly, what’s involved when it comes time to decrypt data from ransomware? For the savvy CISO, understanding how decryption keys are used is vital. But it’s even more important…
In the same way, the iPhone enabled an entire app-store market, EVs will do the same. Creating a brand new market around charging. Not only will the entire convenience-store-as-a-destination model change as EV charging becomes profitable and decentralized, but EV…
The great disruption in customer experience (CX) has arrived. Self-serve tools allow customers to handle their own problems, Average Handle Time (AHT) is no longer a success metric, First Call Resolution (FCR) is now standard, and even the smallest little…
AI and ML are promising tools in the cyber security war. Using them to prevent an attack is top of mind for CISOs. But the differences between malware and ransomware make one easy to detect with AI, while the other…