Introducing How to CISO, Volume 1: The First 91 Days
It seems to be a rite of passage for all CISOs to, at some point in their career, write down...
It seems to be a rite of passage for all CISOs to, at some point in their career, write down...
I was recording Defense in Depth with David Spark, with special guest Yoav Alon, and David made a comment about...
At RSAC 2023, Oren Sade and I will be presenting a delightful talk about how to take a technical analysis...
The security industry spends a lot of ink (or electrons) telling CISOs how to secure their cloud estates, but there...
No one outside the IT department cares about vulnerability metrics. They care about efficacy. And traditional stats don’t show that.
Although an internal SBOM (Software Bill of Materials) is valuable, you owe it to yourself to avoid making it externally...
Security projects are often derailed by hidden security costs that can place additional burdens on an organization.
Why agentless monitoring improves security risk management on the cloud.
Meet Andy Ellis, Advisory CISO for Orca Security.