Threat Hunters, Multi-factor Authentication and Mental Agility
Cybersecurity in a Hyperconnected World: By Kayne McGladrey, IEEE Member, and Stephen Cass, IEEE Spectrum Senior Editor
Similar Posts
A lack of communications enables breaches and helps derail cybersecurity projects
When planning any migration or deployment of new technology, businesses should carefully consider the best way to communicate the intent and need of the new technology to those users affected by it, as well as to those who work in supporting roles. This article will examine the effects of communication (and lack thereof) on two different client projects.
What piece of advice would you give companies approaching an audit?
Video interview with Kayne McGladrey, field CISO of Hyperproof and Chris Denbigh-White, CSO of NextDLP, about the value of automating routine evidence collection and testing as part of ongoing compliance operations.
What’s a Red Flag When Applying for a Cybersecurity Job?
Ever apply for a cybersecurity job and then either in the listing or partway through the interview you realize, “Yikes, this job is not for me.”
eBook: Educated Endpoints
The proverbial endpoint is everywhere. Consumers have more IoT and mobile devices than ever before. Industrial IoT is becoming ubiquitous and IoT malware is as common as cell phones. While conveniences are making their way into every facet of life, so are malicious software, social engineering attack and all manner of bad actors.
Are You Doing All You Can to Protect Your Confidential Documents?
Kayne McGladrey (@kaynemcgladrey), director of information security services at Integral Partners, notes that, for several years, we’ve been hearing predictions about millions of Internet of Things (IoT) devices with poor security joining networks and providing an easy attack vector for third parties.
“Printers are a culturally trusted technology because they’re perceived as not being new,” he says. “However, this doesn’t mean that modern organizations should not consider printers separately from a comprehensive strategy for the IoT.”
Smartphones and Cybersecurity: How to avoid security issues to Keep your Mobile devices safer
The team at Smartphone Evolution had a long-form interview with me to discuss mobile device security, multi-factor authentication, and the IoT.