script for todays security link

Cyber Security Headlines Week in Review: post-ransomware lawsuits, cybersecurity as a hindrance, ChatGPT imposters

This week’s Cyber Security Headlines - Week in Review, March 20-24, is hosted by David Spark with our guest, Kurt Sauer, VP, Information security,...

Security Strategies for Volatile Cloud Containers

In this video, Jimmy Mesta (@jimmesta), CTO, KSOC and I chatted as to why we need to have a discussion around Kubernetes and container...

“Hacking Kubernetes” – Super Cyber Friday

Please join us on Friday, March 17th, 2023 for Super Cyber Friday. Our topic of discussion will be “Hacking Kubernetes: An hour of critical thinking...
Fast Track Burnout for Your Cyber Team with Layoffs

Fast Track Burnout for Your Cyber Team with Layoffs

What happens to your team after the layoffs? Your overextended team now realizes they're going to have to pick up the slack for those...
We Look for Candidates Who Already Know Everything

We Look for Candidates Who Already Know Everything

Future cybersecurity talent is frustrated. The industry demand for cybersecurity professionals is huge, but the openings for green cyber people eager to get into...
We're Experts At Telling You To Fix Your Problems

We’re Experts At Telling You To Fix Your Problems

I don't need another vendor to find my problems. Finding my problems has not been the issue. That's the easy part. Fixing them with...
Why YOU Should Be Your Company's Next CISO

Why YOU Should Be Your Company’s Next CISO

How do you make the argument that your company needs a CISO, and that YOU should be that leader? What do you need to...
How to become a CISO

How to Become a CISO

How do you become a CISO? It doesn't follow a linear pattern as many other professions. There are many different paths and there are...
Can You Build a Security Program on Open Source?

Can You Build a Security Program on Open Source?

What would it take to build your entire security program on open source software, tools, and intelligence? Check out this post for the discussion that is...
Improve third party risk by driving directives down the supply chain

Improve Third Party Risk by Driving Directives Down the Supply Chain

One of the ways to deal with the third party risk issue is to drive down your security knowledge and directives to those operating...
Inventory Is the First Step to Building Cyber Resilience

Inventory Is the First Step to Building Cyber Resilience

So much of the conversation of cybersecurity has evolved into a discussion of cyber resilience. You can't be secure, but you can withstand an...
If the Board Knows Risk, Why Is It Such a Struggle to Explain Cyber Risk?

If the Board Knows Risk, Why Is It Such a Struggle to Explain Cyber...

It's not so easy to explain information security risk through the business lens, as Evelin Biro, CISO, Alliant Credit Union pointed out in our...
Capture the CISO Finals Season 1

Capture the CISO Finals – Season 1

A fantastic first season of Capture the CISO finishes with a fantastic finale. The show went live last Friday, June 17th, 2022, and you...

CISOs Don’t Want to Click on Your “Request a Demo” Button

The "Request a Demo" button. They're proliferating on security vendor sites like weeds. If the vendor knows how to conduct a demo, one would...

Capture the CISO: Open Conversations Between CISOs and Vendors

What's so awesome about CISO Series' newest show Capture the CISO? Here's a conversation between Capture the CISO host, Johna Till Johnson (@JohnaTillJohnso), and Dan...