Similar Posts
The SMB Mission: Data Security Without Compromising User Productivity
ByKayne“Tying data security to user identities is the easiest, lowest-effort way to modernize security for small to medium businesses,” says Kayne McGladrey (@kaynemcgladrey), cybersecurity strategist at Ascent Solutions (@meetascent). “Establishing data security based on user identity means that data remains secure regardless of storage location or medium.”
Managing a Hybrid Workforce: What Are the Key Concerns?
ByKayneKayne McGladrey (@kaynemcgladrey), security architect at Ascent Solutions LLC, said that providing secure access to corporate data for employees regardless of the location of either the employees or the data is still the biggest concern for companies with a hybrid workforce. “Solving this is the core of a Zero Trust strategy, he added. “Zero Trust is now the foundation of modern defensive architectures that companies should use to reduce the material risks associated with legitimate threats.”
3 Cybersecurity Challenges for IIoT Devices in 2018
ByKayneAs the clock ticks towards a massive and preventable cyberattack on IIoT devices, manufacturers and companies deploying them must address three challenges.
Kayne McGladrey – Hyperproof | CISO on the Street | Season 3
ByKayneChris Denbigh-White speaks with Kayne McGladrey, Field CISO of Hyperproof.
10 ways to get more from your security budget
ByKayneFor years, security budgets seemed to go only one direction: up. As recently as February of this year, some 62% of organizations said they planned to increase their cybersecurity spending for 2020, according research by analyst firm ESG.
But that was then.
Like their C-suite peers, CISOs today are being asked to do more with less – and probably will be for some time, as the world continues in these uncertain economic times.
Cyber Privacy, Ethics, and Abuse CISS 417 at WWU
ByKayneOn February 17th, 2021 I’ll will be leading a tabletop exercise for the students of CISS 471 at Western Washington University. The tabletop exercise explores the ethical decisions associated with a ransomware attack at a fictional international organization.