Articles

Executive Management

What is the Role of Vulnerability Management in Cybersecurity
What is the Role of Vulnerability Management in Cybersecurity?

| David Tidmarsh  | Executive Management Introduction Vulnerability management in cybersecurity is crucial for businesses of all sizes and industries. In vulnerability management, organizations continuously assess their IT environments for security flaws, prioritize and rank them based on their severity, and then move to address them appropriately. This article will cover everything you need to…

Read article
CISO Learning Key CISO Roles Skills and Certifications
Essential CISO Learnings 

Essential CISO Learnings | David Tidmarsh |Career and Leadership With cyberattacks on the rise, it’s no surprise that many enterprises are searching for a CISO to mitigate their security risk and bolster their defenses. Between 2021 and 2025, the percentage of Fortune 500 company board members with cybersecurity experience is predicted to rise from 17…

Read article
Important KPIs for a Chief Information Security Officer
KPIs for a Chief Information Security Officer (CISO) 

KPIs for a Chief Information Security Officer (CISO) | Ryan Clancy |Career and Leadership A Chief Information Security Officer (CISO) must track key performance indicators (KPIs) to ensure the organization’s cybersecurity posture is effective. KPIs are important to a CISO because they provide a way to measure progress and identify areas of improvement. By tracking…

Read article
What is Cybersecurity
What is Cybersecurity? Definition, Meaning, and Purpose

What is Cybersecurity? Definition, Meaning, and Purpose |Career and Leadership “Cybersecurity is much more than a matter of IT.” ― Stephane Nappo. As we progress in our digitalization, the chances of becoming a target to damaging cyberattacks increases. While there is no way to stop the occurrence, staying vigilant and adopting a holistic security approach…

Read article
How Does Cybersecurity Management Work
How Does Cybersecurity Management Work?

What Is Cybersecurity Management, and Why Is it Important? | Ber Leary |Career and Leadership Cyberattacks increased by 50% in 2021, reaching an all-time peak in Q4 as companies experienced an average of 900 attacks per week (Check Point, 2022). Businesses are under relentless assault and can only keep their data safe by investing in…

Read article
How to Become a CISO
How to Become a CISO (Chief Information Security Officer) 

How to Become a CISO (Chief Information Security Officer) | Shelby Vankirk |Cloud Security The Chief Information Security Officer (CISO) is one of digital security’s most powerful and high-paying roles. As a CISO, you’ll have complete responsibility for all aspects of your organization’s data. You will also play a vital role in business strategy and…

Read article
Top 25 software weaknesses
25 Most Dangerous Software Weaknesses for 2022 Announced

CWE Top 25 Most Dangerous Software Weaknesses for 2022 Announced Out-of-bounds writes, cross-site scripting, and SQL injection topped this year’s list. On June 28, the Common Weakness Enumeration team announced the release of 2022’s Top 25 Most Dangerous Software Weaknesses list. Out-of-bounds writes, cross-site scripting (XSS), and SQL injection are among this year’s CWE Top…

Read article
U.S. Passes New Cybersecurity Laws in June 2022
U.S. Passes New Cybersecurity Legislation in June 2022

U.S. Passes New Cybersecurity Legislation in June 2022 The bills, signed into law on June 21, aim to strengthen the federal cyber workforce and foster collaboration across all levels of government. On June 21, 2022, U.S. President Joe Biden signed two cybersecurity bills into law. The latest in a series of efforts to improve the…

Read article