processes

The Cybersecurity Horizon: AI, Resilience and Collaboration in 2024
Steve Winterfeld | | AI, Cybersecurity, horizon, Insights, machine learning, people, processes, Tech
As we peer into the future, it is imperative to acknowledge the profound impact that artificial intelligence (AI) is having on the cybersecurity arena ...
Security Boulevard
The Security Wisdom of the All-Knowing CISO
Have you ever noticed how closely your role as the CISO of your organisation resembles that of the Wizard from “The Wizard of Oz?” As the Wizard, you are expected to be ...
The Four Stages to a Successful Vulnerability Management Program
Have you ever been around someone who is just better at something than you are? Like when you were in grade school and there was this person who was effortless at doing ...

Secure Working from Home – Some Ideas and Guidance
Roger Halbheer | | Corona, Home Office, Incidents, Microsoft, people, policy, Process, processes, Products, security, strategy, work from home
There is plenty of information out there how to secure a “Home Office” environment in these days and I do not want this to be another one. However, I tried to compile ...
Secure Virtual Coffee – Top of Mind?
Roger Halbheer | | byod, consumer, Corona, Microsoft, partner, processes, Products, strategy, work from home
< Deutsch weiter unten> Yes, I am sitting in my Home Office – as you might these days. Maybe the difference is that I am more or less used to this situation, ...
Hackers Come for Oil and Gas
The Vaporstream Team | | Cybersecurity, cyberthreats, Energy, Oil and Gas, Phishing, processes, supply chain, training, Vulnerabilities
Last month’s ransomware attack against the Mexican oil firm Pemex showed how the oil industry’s embrace of digital technology has made them a high-value target for hackers. The attack—a strain of ransomware ...
How to leverage “Secure Access Workstations” for the Cloud
Roger Halbheer | | cloud computing, Incidents, Industry, Microsoft, people, Process, processes, security, strategy, technology
This is a questions I get fairly often. But before I try to answer, let’s take a step back: We know that attackers typically try to compromise user accounts and then move ...

DevSecOps: Beyond Manual Policy Implementation
How DevSecOps can help organization streamline and advance their processes beyond manual or hybrid solutions When someone asks you if your company prioritizes security, most of us do a quick mental checklist: ...
Security Boulevard
Shared Responsibility in the Cloud (and how to mess it up)
Roger Halbheer | | Cloud, cloud computing, Cloud computing security, Microsoft, Office365, processes
I am deeply convinced that moving to the Cloud – for most companies – will increase their security dramatically – I would even go that far that a secure future without leveraging ...

Book review: “Own Your Future : How to Think Like an Entrepreneur and Thrive in an Unpredictable Economy” by Paul B. Brown et al. The ALBR process
I came accross this book by Paul B. Brown, Charles F. Kiefer and Leonard A. Schlesinger almost by chance. The title was enticing so I decided to give it a go. You ...