Benefits for Veterans In Cyber Security

What are some benefits for Veterans in Cyber Security? After two combat deployments to Iraq with the Marines, I knew I wanted to leave the military when my contract was done. Like so many other veterans transitioning out of the service, I wasn’t exactly sure where I belonged in the civilian sector. I had a...

3 Ways Organizations Will Act In 2017 On Their Security Programs

Option 1: Organizations will try to defend themselves with the help of a diet pill strategy. In the year 2017, organizations will be seen taking many shortcuts in the pursuit to do something with their security systems. Many don’t know, but security program development process takes a bit time and is basically process based. The...

2017: The Year to Develop Efficient Security Programs

2017: Year to Build A Repeatable System For Information Security Program Management It was just in the year 2004 that we had released the CISCO Handbook. The book described the step-by-step methodology for building effective information security program. When it released, we thought our team would create an information security consultancy to spread the word...

How should you protect your online accounts?

Why is it Important to Use Complex Passwords Across Multiple Websites and Applications? The majority of companies and websites have been breached. The most recent being Yahoo where over 1 billion accounts were compromised. These attacks result in accounts, and often passwords, being sold on the black market for reuse by criminals. If you use...

Yahoo Breach: How does it effect you?

  Yahoo Breach: Why it Effects All Websites with User Accounts The Yahoo breach, will, of course, impact all the users in which accounts were stolen, but it also has a larger impact on other website or application operators where Yahoo users are also members. In many cases, people use their Yahoo email address as...

Security Remediation Planning | Tips and Considerations for Planning Activities [VIDEO]

Security Remediation Planning: Tips for Non-Security Executives “People are spending a lot of money right now on remediation planning, but they are surprised that they are not getting the results they expected.” -Mike Gentile As we enter, 2017 many organizations are currently planning how to fix significant amounts of security issues within their organizations. These...

Security Program Elements | Is your Information Security Program a Flip or Flop?

Elements of a Healthy Security Program Many companies are trying to implement Cyber Security Programs for their organization. An interesting security program element is there is no correlation between spending a lot of money on security technologies, using a well-known consultancy to build a set of security policies for your organization or any of the...

How do you get the most value out of your penetration test?

These days, there are many paths for the average emerging growth organization, which lead to the need to perform a penetration test for the business. It may be a requirement from a potential new customer, as part of a regulatory audit, or to understand the risk profile of your technical environment within a self-driven assessment....

How to get security started in a high growth start-up

At any high-growth start-up or entrepreneurial company there are many focus areas for the business going on simultaneously; all of which are growing rapidly. People are moving fast; there is too much to do, and not enough time to do it. In these situations, security often plays a unique role in that everyone now knows...

What should market research firms know about security?

Market Research Firms and Cyber Security You see, I have written multiple recognized books on the subject (including “The CISO Handbook”), provided hundreds of presentations, and built many security programs in both internal and consulting roles for organizations ranging from bootstrap start-ups to leading Fortune 500’s. Some of what I have written is used as...