• 7 Practices that Make Your Organization Vulnerable to Cyber Attacks

    Today I read “How you can be the smartest cybersecurity expert in the room” on CIO.com. The author notes, “many CIOs and senior IT leaders are almost clueless about where to focus and how to start building next-gen security functions.” …

  • Fundamental Endpoint Security Best Practice: Securing Privilege on the Endpoint

    Information security professionals know there are two fundamental endpoint security practices that should be part of their security program in order to reduce the attack surface. Validated by various government information security organizations and industry analysts, the first practice is …