Cyber Safe for the Holidays

Cyber Safe for the Holidays

The holiday season brings joy, festivities, and amazing deals – but it also attracts cybercriminals looking to take advantage of eager shoppers. Here’s how to protect yourself while hunting for the perfect gifts. After a day of feasting with family and friends, the holiday shopping season officially begins next Friday, ... Read More
The Benefits of Upgrading to XDR: Why MDR is No Longer Sufficient as 2024 Comes to a Close

The Benefits of Upgrading to XDR: Why MDR is No Longer Sufficient as 2024 Comes to a Close

Gary Perkins, Chief Information Security Officer, CISO Global Upgrading to XDR is not just a technological upgrade—it’s a strategic move toward future-proofing your cybersecurity posture against the ever-evolving landscape of cyber threats. Cybersecurity has never been as critical as it is today. With cyberattacks becoming more frequent, sophisticated, and pervasive, ... Read More
The Global Effort to Maintain Supply Chain Security | Part Two

The Global Effort to Maintain Supply Chain Security | Part Two

Various Cybersecurity Experts, CISO Global A well-run kitchen requires a fully stocked pantry and a clear understanding of what’s on hand. In cybersecurity, your pantry is your asset inventory—every server, every piece of software, and even those firmware components lurking in the background. You wouldn’t want to cook without knowing ... Read More
AI in Banking: No Longer Just for the Big Banks

AI in Banking: No Longer Just for the Big Banks

Tigran Safari, Client Success Manager AI isn’t some far-off sci-fi concept anymore. It’s here, and it’s coming to a bank near you! Listen to the latest from Tigran Safari and Chris Clements on this month’s Banking Podcast from The Kafafian Group We’ve spent a significant part of our journey working ... Read More
Cyber Scams & Why We Fall for Them

Cyber Scams & Why We Fall for Them

Gary Perkins, Chief Information Security Officer Social engineers rely on two key psychological triggers: urgency and empathy. When people feel rushed or that they are helping someone in need, their normal critical thinking is often overridden. Attackers don’t just hack systems; they hack people, and they’re exceptionally good at it ... Read More
Is End-User Cybersecurity Training Useless? Spoiler Alert: It’s Not!

Is End-User Cybersecurity Training Useless? Spoiler Alert: It’s Not!

Chris Clements, VP of Solutions Architecture Because of the frequency of phishing attacks landing in user mailboxes and the severity of the consequences of a user falling for a lure, any improvement at all can make the difference between an organization suffering a breach.  Detrimental Best Practices One of my ... Read More
Identity Under Siege: Responding to the National Public Data Breach

Identity Under Siege: Responding to the National Public Data Breach

Gary Perkins, Chief Information Security Officer, CISO Global While the scale of this data breach is alarming – with 277 gigabytes of data reportedly stolen – it’s important not to panic. Instead, focus on taking concrete steps to protect yourself. Stay informed, be proactive in safeguarding your personal information, and ... Read More
A Treacherous Dinner Party: The Global Effort to Maintain Supply Chain Security

A Treacherous Dinner Party: The Global Effort to Maintain Supply Chain Security

Various Security Experts at CISO Global  …In the world of supply chain security, vigilance is your best friend. Stay informed, stay alert, and always prioritize security in your decisions. After all, in this interconnected digital world, we’re all in this together. Imagine you’re hosting a dinner party, and you’ve carefully ... Read More
Navigating the Shared Responsibility Model: Lessons Learned from the Snowflake Cybersecurity Incident

Navigating the Shared Responsibility Model: Lessons Learned from the Snowflake Cybersecurity Incident

Jerry Dawkins, PhD In the world of cybersecurity, the recent incident involving Snowflake has sparked a significant discussion around the shared responsibility between vendors and customers. The attacks, which targeted over 100 Snowflake customers, have highlighted vulnerabilities that arise not from the platform itself, but from how customers manage their ... Read More
Cyber Insurers Are Not Your Friend – Why a Warranty May Be a Better Option

Cyber Insurers Are Not Your Friend – Why a Warranty May Be a Better Option

Gary Perkins, Chief Information Security Officer In this landscape, organizations need a multi-faceted approach that includes prevention, detection, and response capabilities. A warranty tied to a comprehensive security solution supports this approach, providing both technological protection and financial assurance. The Trouble with Insurance Cyber insurers are increasingly being viewed with ... Read More