Skip to main content

Posts

Showing posts from 2017

Featured

How 2020 Presidential Candidates Can Guard Against Cyberattacks

The 2016 presidential election witnessed unprecedented Russian cyberattacks and disinformation campaigns designed to disrupt the U.S. electoral system by influencing public opinion. The Russian goal is intended to destabilize the U.S.  through ideological activism, advancing their interest and further their political agenda. Their methods compromised computer systems of candidates and political parties using the exfiltrated data to spread disinformation and influence presidential elections.

On January 6, 2017, the U.S. Director of National Intelligence released a declassified report “Assessing Russian Activities and Intentions in Recent U.S. Elections.” According to the report, Vladimir Putin ordered a massive campaign orchestrating attacks from multiple fronts that involved spreading pro-Trump propaganda on social media to hacking the Democratic National Committee (DNC). Their methods resulted in massive data breaches within the DNC that included access to John Podesta's email f…

Will 2018 Be a Year Addressing the Skills Gap and Cloud Security?

Things to Consider When Calculating the Return on Security Investment

Security Awareness Tips for The Holidays

Filling the Cybersecurity Skills Gap With Freelance Security Professionals

Security Awareness Training Is a Team Effort

Don’t Let Organizational Politics Derail Security Initiatives

The CISO’s Guide to Minimizing Health Care Security Risks

When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law

The CISO’s Guide to Managing Insider Threats

Why Machine Learning Is an Essential Tool In the CISO’s Arsenal

Hire a Team of Hackers to Identify Vulnerabilities

Is Cloud Security a Safe Bet for Highly Sensitive Government Data?

Succession Planning: The Importance of a Deputy CISO

Information Security in the Age of Disinformation

Is the CISO Job Market Overcrowded?

Building an Effective CISO-CIO Partnership

How The Next-Generation CISO Will Lead Security Strategy

CISO Complexity: A Role More Daunting Than Ever