Hello, my ever-vigilant cyber sentinels! Today, we’re delving into a topic that’s guaranteed to make any CISO reach for the aspirin—insider threats. Now, I know what you’re thinking: “Isn’t it enough that we’re constantly battling external attackers, patching vulnerabilities, and keeping up with the latest cyber gizmos?” But here’s the kicker: some of the most […]
Securing the Digital Outposts, Part 2: Balancing Freedom with Security
Securing the Digital Outposts, Part 1: The Risks of Remote Work
As remote work becomes the new norm, “transforming our once-centralized fortresses into sprawling digital empires,” security leaders need to continue to step up their game. In the first of a two-part blog, Jason Alexander identifies the top risks of hybrid environments – and how they affect an organization’s cybersecurity posture.
“A Beacon of Simplicity & Security”: Examining the Benefits and Risks of Single Sign-on
With “its singular, robust authentication system,” single sign-on (SSO) can transform the landscape of cybersecurity and user management.” However, it requires a “thoughtful approach,” according to Jason Alexander. In this piece, the Grumpy CISO discusses the benefits and risks of SSO, and provides guidance on how to successfully implement it.
“Illuminating the Shadows:” How Leaders Can Harness the Power of Threat Intelligence
Integrating threat intelligence into the cybersecurity strategy can strengthen defenses, but it can also contribute to a broader understanding of the threat landscape, said CISO Jason Alexander. In this piece, he discusses the foundations of threat intelligence and how to weave it into the fabric of security programs.