People & Process

Peak Vendor: Reclaiming Infosec Priorities and Budgets in the age of big marketing

Apr 21, 2023

Featured Posts

Flip The Script: Let The Attackers “Win”
What does it look like when organizations do their data security and risk management homework upfront,

2 min read

April 5, 2023

Cybersecurity Is Dead — What Now?
We must stop insisting cybersecurity can "win" the war against cybercriminals, because we've already lost.

2 min read

March 10, 2023

Data Breach Cynicism Takes Hold
In more than 20 years of working in the IT security industry, I’ve helped literally hundreds of companies

2 min read

November 14, 2022

Banishing The Backseat Drivers
If you’re in security, you know how

2 min read

March 30, 2022

Recent Posts

Understanding DSPM and Microsoft’s
Approach to Data Security &
Governance

Data Security Posture Management (DSPM) is rapidly evolving as a critical component in the data security....
3 min read
November 22, 2024

Cyber Risk Preparedness: The General
Counsel’s Responsibility

In today's increasingly regulated business climate, cyber risk—specifically data risk—is a top priority.
3 min read
November 6, 2023

What is Data Risk Management?
Safeguarding Data in Today’s Complex Landscape

Explore "what is data risk management" and its significance in safeguarding data. Dive into its essential components and its role in today's data-driven world.
12 min read
October 28, 2023

Peak Vendor: Reclaiming Infosec Priorities And Budgets In The Age Of Big Marketing

I’m not sure when the bubble began. Three years ago? Five? Security needs
2 min read
May 3, 2023

Tags

Categories

Join Our Newsletter

Follow Us