What does good look like? Part one

Part one Preamble  We always hear the words in security “good practice”, “good security” and so on. But what does good mean? From the GDPR it uses the lovely phase of “Taking into account the nature, scope, context and purposes of processing as well as the risks of varying likelihood and […]

Read more

CISO: First 30 days

Intro I have seen quite a few articles on what CISO’s should concentrate on so I am going to give you my opinion. So you have just landed a new role as CISO so after induction (if you don’t have one add it to the list of items to resolve) […]

Read more

Selling to the CISO

Or Matt’s guide to Selling to the CISO ( I only put this in for SEO sorry) Being a former Global CISO and security leader in the telecommunications, manufacturing and healthcare industries my goal was to build a security and risk management program that identified the most critical risks to […]

Read more

Cost Effective Security

This article is about how security can be implemented in a cost-effective way adding benefit to the business, however, it needs to be driven from the senior leadership of the organisation. This might come across as a bit of letting off steam and with that said and in the words […]

Read more

Important Cyber Security Metrics

Important Cyber Security Metrics to Track If your multi-layer security has been breached, measuring how far they ingressed will help you defend against future attacks. You would be surprised how sensitive information is handled generally; for this reason, enterprise security experts constantly check for unapproved storage of sensitive information or […]

Read more

The need for Cybersecurity Talent

Why companies need to hire cybersecurity talent As the current generation is evolving along with the technology and getting most of there work done through devices, the need for cyber experts is also increasing. The most important work, data, and finances rest in our systems and so assuring its safety […]

Read more