script for todays security link

Week in Review: Cyberattacks hit Taiwan, Missile manufacturer hit, Class action donuts

This week’s Cyber Security Headlines - Week in Review, June 6-10, is hosted by Rich Stroffolino with our guest, Yael Nagler, CISO, Walker &...
Capture the CISO Finals Season 1

Capture the CISO Finals – Season 1

A fantastic first season of Capture the CISO finishes with a fantastic finale. The show went live last Friday, June 17th, 2022, and you...

CISOs Don’t Want to Click on Your “Request a Demo” Button

The "Request a Demo" button. They're proliferating on security vendor sites like weeds. If the vendor knows how to conduct a demo, one would...

Capture the CISO: Open Conversations Between CISOs and Vendors

What's so awesome about CISO Series' newest show Capture the CISO? Here's a conversation between Capture the CISO host, Johna Till Johnson (@JohnaTillJohnso), and Dan...

Half of Companies Don’t Have a Security Policy for Open Source Software

You don't need to touch or use open source software directly for it to be a concern to your organization. Your proprietary applications are...

Why Current Events Can and Will Affect Your Security Posture

Even though it may not be important to you right now, what’s happening in the news is important to someone or some nation. Therefore,...
When Does an Exaggeration Become a Lie?

When Does an Exaggeration Become a Lie?

We explore the world of dishonesty in cybersecurity. Practitioners know that marketers will stretch the truth, but how far are we willing to let...
Yuck! Now Everyone Has Touched My Data.

Yuck! Now Everyone Has Touched My Data.

What can you do when your data keeps passing through different third party applications? Your data is being accessed and manipulated by more people,...
“Bad” Security Practices That Really Aren’t All that Bad

“Bad” Security Practices That Really Aren’t All that Bad

If they can find flaws, security professionals are quick to label it as bad security behavior. But often, what is marked as "bad" may...
Practical Cybersecurity for IT Professionals

Practical Cybersecurity for IT Professionals

You’re a CISO, vCISO, or MSSP rolling into a company that has yet to launch a cybersecurity department. How do you communicate about cyber...
Data Protection for Whatever Comes Next

Data Protection for Whatever Comes Next

Cybersecurity boils down to securing your data or data protection. But that simple concept has turned into a monumental task that is only exacerbated...
What Is Attack Surface Profiling?

What Is Attack Surface Profiling?

Is attack surface profiling the same as a pen test? If it isn't what unique insight can attack surface profiling deliver? Check out this post for the...

Legendary CISO Andy Ellis Joins CISO Series

Here's some big news. Andy Ellis (@csoandy), well-known CISO and now operating partner with YL Ventures, is joining the CISO Series. He'll be a...

How to Avoid 20 Common Security Failures in Software Development

Are we moving too fast? In software, developers often don’t have a choice. Speed becomes a business imperative for survival and to stay competitive. “Software development is...

What Are the Shared Responsibilities Between Customer and Cloud Provider?

We have all heard the myths that your data is secure in the cloud or it's not secure in the cloud. Neither is actually...