
Cyber Safe for the Holidays
The holiday season brings joy, festivities, and amazing deals – but it also attracts cybercriminals looking to take advantage of eager shoppers. Here’s how to protect yourself while hunting for the perfect ...

The Benefits of Upgrading to XDR: Why MDR is No Longer Sufficient as 2024 Comes to a Close
hmeyers | | Blog Posts, Cybersecurity, Cybersecurity Detection and Response, Endpoint Protection, XDR
Gary Perkins, Chief Information Security Officer, CISO Global Upgrading to XDR is not just a technological upgrade—it’s a strategic move toward future-proofing your cybersecurity posture against the ever-evolving landscape of cyber threats ...

The Global Effort to Maintain Supply Chain Security | Part Two
Various Cybersecurity Experts, CISO Global A well-run kitchen requires a fully stocked pantry and a clear understanding of what’s on hand. In cybersecurity, your pantry is your asset inventory—every server, every piece ...

AI in Banking: No Longer Just for the Big Banks
hmeyers | | AI, Artificial Intelligence, banking, Blog Posts, Finance, Finance Industry, machine learning
Tigran Safari, Client Success Manager AI isn’t some far-off sci-fi concept anymore. It’s here, and it’s coming to a bank near you! Listen to the latest from Tigran Safari and Chris Clements ...

Cyber Scams & Why We Fall for Them
Gary Perkins, Chief Information Security Officer Social engineers rely on two key psychological triggers: urgency and empathy. When people feel rushed or that they are helping someone in need, their normal critical ...

Is End-User Cybersecurity Training Useless? Spoiler Alert: It’s Not!
Chris Clements, VP of Solutions Architecture Because of the frequency of phishing attacks landing in user mailboxes and the severity of the consequences of a user falling for a lure, any improvement ...

Identity Under Siege: Responding to the National Public Data Breach
Gary Perkins, Chief Information Security Officer, CISO Global While the scale of this data breach is alarming – with 277 gigabytes of data reportedly stolen – it’s important not to panic. Instead, ...

A Treacherous Dinner Party: The Global Effort to Maintain Supply Chain Security
hmeyers | | Blog Posts, Cybersecurity, Extended Detection and Response, security, supply chain, TechRadar, XDR
Various Security Experts at CISO Global …In the world of supply chain security, vigilance is your best friend. Stay informed, stay alert, and always prioritize security in your decisions. After all, in ...

Navigating the Shared Responsibility Model: Lessons Learned from the Snowflake Cybersecurity Incident
Jerry Dawkins, PhD In the world of cybersecurity, the recent incident involving Snowflake has sparked a significant discussion around the shared responsibility between vendors and customers. The attacks, which targeted over 100 ...

Cyber Insurers Are Not Your Friend – Why a Warranty May Be a Better Option
hmeyers | | Blog Posts, CISO, cyber insurance, Cybersecurity, Endpoint Protection, Insights, warranties
Gary Perkins, Chief Information Security Officer In this landscape, organizations need a multi-faceted approach that includes prevention, detection, and response capabilities. A warranty tied to a comprehensive security solution supports this approach, ...