Syndicated Blog

CISO Global
Cybersecurity is a Culture, Not a Product
Badge Life: The CISO Team Takes on DEF CON

Badge Life: The CISO Team Takes on DEF CON

The CISO Global Pen Testing Team Earlier this month, a group of our intrepid pen testers from our Readiness & Resilience team at CISO Global ventured into the heart of the hacking ...
The Polar Bear in Your Kitchen: A Cybersecurity Analogy

The Polar Bear in Your Kitchen: A Cybersecurity Analogy

Chris Clements, VP of Solutions Architecture at CISO Global High-Tech Pest Control = Threat Detection & Response Imagine for a moment that your home has a rodent problem. To address this, you ...
The Cybersecurity Industry is Under Scrutiny Yet Again

The Cybersecurity Industry is Under Scrutiny Yet Again

Jerald Dawkins, PhD, Chief Technology Officer at CISO Global  In the weeks following the CrowdStrike global tech outage, cyber companies and their end-users alike are evaluating their incident response plans. It likely ...
Visibility in Management: Navigating the Cybersecurity Landscape with Argo | Part II - Blog Image

Visibility in Management: Navigating the Cybersecurity Landscape with Argo | Part II

| | Blog Posts
Jerald Dawkins, PhD, Chief Technology Officer at CISO Global  Imagine a world where combing siloed data reports is a thing of the past, freeing us to focus on risk management and actionable ...
The [Beatings] Ransoms Will Continue Until [Morale] Culture Improves Blog image - Chris Clements

The Beatings Ransoms Will Continue Until Morale Culture Improves

| | Blog Posts, Insights
Chris Clements, VP of Solutions Architecture at CISO Global Fundamental Problems As we near the halfway point of 2024, it is apparent that the epidemic of extortionary cyber attacks will continue unabated ...
Global Assets Navigating the Cybersecurity Landscape with Argo | Part I

Global Assets: Navigating the Cybersecurity Landscape with Argo | Part I

| | Blog Posts
Jerry Dawkins, PhD, Chief Technology Officer at CISO Global  In today’s digital age, organizations are often crippled by a cybersecurity environment that is fragmented and complex. The jumble of security data — ...
Spring into Action: A Corporate Digital Spring Cleaning Plan blog graphic with image of author, James Keiser

Spring into Action: A Corporate Digital Spring Cleaning Plan

| | Blog Posts
James Keiser, Director of Secured Managed Services (SMS) at CISO Global  Spring cleaning is no longer just about spotless windows and gleaming floors. In the digital age, businesses need to consider the ...
NIST CSF 2.0: A Deeper Dive into Middle-Earth Blog image with author Sam Lewis

NIST CSF 2.0: A Deeper Dive into Middle-Earth 

| | Blog Posts
Samuel Lewis, Senior Security Consultant at CISO Global   Sequels, bah! Usually, they are never as good as the first. Do not even speak of prequels! This is less of a sequel, and ...
The Surveillance Invasion: IoT and Smart Devices Stealing Corporate Secrets with author, blog image

The Surveillance Invasion: IoT and Smart Devices Stealing Corporate Secrets

| | Blog Posts
Chris Clements, VP of Solutions Architecture at CISO Global “Hey Alexa, are you stealing my company’s data?” In an age where manufacturers have decided that just about every device needs to be ...
The Argument for Enterprise-Wide Ad Blocking - Featured blog

The Argument for Enterprise-Wide Ad Blocking 

| | Blog Posts
Chris Clements, VP of Solutions Architecture at CISO Global The concept of enterprise-wide ad blocking always provokes a powerful response. Whenever I suggest, even casually, that the next step organizations should take ...

Application Security Check Up