In the rapidly changing landscape of cybersecurity the conversation around the effectiveness of security awareness training platforms has never been more important. As organizations pour significant resources into these platforms, the pressing question remains: are they truly effective in addressing…
Going to conferences has become a regular occurrence for professionals. Within the security space, Black Hat is one of the most well-known and largest conferences, drawing immense crowds each year. In 2023, Black Hat boasted over 22,750 unique attendees. When…
Imagine someone locking you out of your own house, digging through your sensitive documents, and threatening to share this private information unless you pay them an exorbitant amount of money. For tech leaders, this is reality. Are you prepared to defend…
As a featured guest on the The CISO Insights podcast Jacob Friedman told of his first unpleasant experience in cyber security, the flaw in Gartner’s approach, and the emerging themes he sees in cybersecurity. Hosted by Misha Sobolev, the show…
When a client asked about the difference between secrets management and password vaulting, I realized his question was a good one. Our collective history of such a simple string of characters is one of pain, agony and frustration. There’s no…
Our own tech scout Jacob Friedman was featured on InfoSecLive’s LinkedIn livestream and on YouTube today by Simon Linstead. Info-sec.live is a cybersecurity community that was launched in June 2021. It has grown to over 4000 members and is followed…
A free tool has been released by the Cybersecurity & Infrastructure Security Agency (CISA) called “Untitled Goose Tool” or Goose for short. CISA states that the free tool helps network defenders detect potentially malicious activity by assisting in data gathering…
We now know the downside of AI in call center operations. As ChatGPT changes the nature of work, AI for call center is having a surprising negative impact. The results are in. Reducing complexity and increasing efficiency has surprising side…
What is a Group Policy? It’s the method by which many IT execs update and apply security and configuration settings to groups of machines throughout their network. On the surface, it’s considered a proactive and efficient way to secure and…
What is a decryption key? How is it used? And most importantly, what’s involved when it comes time to decrypt data from ransomware? For the savvy CISO, understanding how decryption keys are used is vital. But it’s even more important…