An account takeover traditionally follows a methodical path that takes considerable time before anything bad happens. Is it worth a company’s time and effort to be monitoring a potential account takeover at the earliest stages? Check out this post for the…
Podcast
Ah, Here’s The Problem. You’ve Got a Leaky CEO.
Ah, Here’s The Problem. You’ve Got a Leaky CEO.
We’re waking up the C-suite to the realization that they’re the prime target for cyberattacks. This episode was recorded in front of a live audience at Evanta’s CISO Executive Summit in Los Angeles. It is hosted by me, David Spark (@dspark), producer…
Defense in Depth: UX in Cybersecurity
Defense in Depth: UX in Cybersecurity
Security products and programs may be functional and work correctly, but are they usable in the sense that it fits into the work patterns of our users? Check out this post for the discussion that is the basis of our conversation…
Trust Me, We’re Using “Advanced” AI
Trust Me, We’re Using “Advanced” AI
We’re looking for a good reason to trust your AI on the latest CISO/Security Vendor Relationship Podcast. This episode was recorded in front of a live audience at Evanta’s CISO Executive Summit in San Francisco. It is hosted by me, David…
Defense in Depth: InfoSec Trends for 2020
Defense in Depth: InfoSec Trends for 2020
We’re coming to the end of the year and that means it’s time to make our predictions for 2020. Mark this episode and check back in one year to see how we did. Check out this post for the discussion that…
Isn’t That Adorable? Our Little CISO Has An Opinion.
Isn’t That Adorable? Our Little CISO Has An Opinion.
We’re spoon-feeding “respect” to the CISO on this week’s CISO/Security Vendor Relationship Podcast. This episode is hosted by me, David Spark (@dspark), producer of CISO Series and founder of Spark Media Solutions and Mike Johnson. Our sponsored guest this week, thanks to Trend Micro, is…
Rest Assured, We’re Confident Our Security Sucks
Rest Assured, We’re Confident Our Security Sucks
We may not have the protection you want, but what we lack in adequate security we make up in confidence. Sleep better at night after you listen to this week’s episode of CISO/Security Vendor Relationship Podcast. This episode is hosted…
Hacking Humans: Security Has to Be Friendly
Hacking Humans: Security Has to Be Friendly
If you want security to work at your organization, it needs to be accessible or friendly to your users. If they have to side step any kind of control you have in place, then that security control is going to…
Defense in Depth: Cybersecurity Readiness as Hiring Criteria
Defense in Depth: Cybersecurity Readiness as Hiring Criteria
What if every candidate interviewed was tested on their cybersecurity competency? How would that affect hiring and how would that affect your company’s security? Check out this post for the discussion that is the basis of our conversation on this week’s…
What Security Advice Will Your Family Ignore?
What Security Advice Will Your Family Ignore?
This Thanksgiving we wish you lots of luck convincing your family members to use a password manager. Would getting them to switch political allegiances be easier? This episode is hosted by me, David Spark (@dspark), producer of CISO Series and founder of Spark…