From the Summer 2024 Issue

Data Privacy: Regulations, Risks & Practicing Good Cybersecurity Hygiene


Mathew Scott, MCFE, Vice President, Equipment Consulting, J.S. Held

Introduction In a world that revolves around the collection and use of various forms of data, continuously assuring the  privacy of data being collected and stored is a major factor in cybersecurity hygiene, i.e. habitual practices for ensuring the safe handling of critical data and for securing networks. Managing the privacy of one’s data includes … Read more

From the Spring 2024 Issue

Digital Twins: Mirroring Business, Mirroring Cybersecurity Risks


Henry J. Sienkiewicz, Faculty, Georgetown University

Digital Twins

A digital twin is a virtual representation of a physical object, process, or system. Digital twins have emerged as a critical technology that fundamentally changes how companies design, monitor, and maintain their physical assets in today’s rapidly evolving industrial landscape. A digital twin is a virtual representation of a physical object, process, or system. Often … Read more

From the Spring 2022 Issue

7 Key Questions That Gauge the Effectiveness of Present and Future Cybersecurity Programs


Amit Kandpal, Director, Customer Success, Netskope

It is no secret that a well-defined, tested and implemented cybersecurity program is an essential function for the stability of business operations; however, there are many variables to consider. Rapid advances in technology have changed the dynamics of informed decision-making with the best option often being to introduce a newer technology into the market, rather … Read more

How to Stay Safe Online: Best Safety Tips and Resources


Aloukik Rathore, Co-Founder, Cannibals Media

Online Safety - Stay Safe Online

People should be informed of online safety precautions in today’s digital environment. The extent of our reliance on the web cannot be overstated. Different corporations and enterprises are continually collecting and storing our private data and information in order to target adverts, sales, and promotions based on our preferences. How can we undertake individual efforts … Read more

From the Fall 2021 Issue

Trade-Offs of Convenience: Social Logins, Password Managers and Other Single Points of Failure in User Authentication


Tina Gravel, SVP Global Channels and Alliances , Appgate

Trade Offs of Convenience

As every experienced CSO understands all too well, security is a continuous exercise in evaluating and balancing a nexus of trade-offs between risk, cost, and user experience. This calculation becomes especially tricky when it comes to weighing the trade-offs between how to properly authenticate a user and do so without degrading their experience. If you … Read more

From the Fall 2021 Issue

How to Manage Challenges of Cloud Migration and Microsoft Vulnerabilities


Chris Jordan, CEO, Fluency Security

How to Manage Challenges of Cloud Migration & Microsoft Vulnerabilities

As a leading provider for users looking to rely on cloud and SaaS services, Microsoft clearly has a huge presence spanning nearly every industry and geography. However, many users are unaware of the additional services needed to protect cloud-based data. Since Microsoft only offers security services as premium add-ons, there is a lack of clarity … Read more

From the Fall 2021 Issue

The Cyber-Hygiene Mantra


Chuck Brooks, President , Brooks Consulting International

The Cyber Hygiene Mantra

National Cybersecurity Awareness Month is a good time for everyone to review the importance of the basics of defending their data and devices from cyber-attackers. Cyber-hygiene is a starting point to build those fortifications. Back in 2017, Congress passed legislation (HR3010) called “Promoting Good Cyber Hygiene Act of 2017”.  It was introduced to implore the … Read more

From the Fall 2021 Issue

The Ardennes, Again


David W. Archer, PhD, Principal Scientist, Niobium Microsystems and Galois, Inc.

Thin Red Line

Zero-Day, Zero Trust, and the 99th Infantry Division  Zero Day December 16, 1944. Unexpected Allied success after D-Day led to a thin defensive line in the Ardennes forest. Armed with that knowledge and suspecting weakness in the Allies’ resolve, Hitler swung his last big hammer in an attempt to shatter the alliance and force a truce. … Read more

From the Fall 2021 Issue

The Most Financially Devastating Form of Cyber-Attacks Can be Thwarted for Free


A.J. Nash, Vice President of Intelligence, ZeroFOX

As ransomware continues to grab most of the headlines in cybersecurity, it’s easy to lose track of the much larger threat of Business Email Compromise (BEC). According to the FBI’s 2020 Internet Crime Report, the Internet Crime Complaint Center (IC3) received 2,474 complaints of ransomware that resulted in $29.1M in financial loss.[1] While it is … Read more

The Dynamic Duo: Data Breaches And Employers


James Keenan, Automation and Anonymity Evangelist, Smartproxy

Your data and employers

Before you fill out your next employment form, look at it and assess how much of your personal information you are handing over. Your full name, where you studied in college, your home address – this is just a snippet of the information employers request from us.  You always hear tips about staying private on … Read more