top of page
Search
Sec-Blogger
Jul 26, 20206 min read
CISOs in the Cloud with Pets and Cattle
CISOs in the Cloud
20 views0 comments
Sec-Blogger
Jul 4, 20203 min read
Today's Challenges and Digital Leadership
No two leadership jobs are the same. Leadership should always lead with empathy, authenticity, and leading by example. What makes a...
17 views0 comments
Sec-Blogger
Dec 28, 20192 min read
What is RPA, why it matters
What is Robotic Process Automation or RPA Robotic Process Automation or RPA is one of the newest emerging forms of automation using...
28 views0 comments
Sec-Blogger
Nov 23, 20194 min read
Why Do We Need Data Privacy Laws?
There has been no shortage of data privacy laws enacted in the past few years. The one that has received the most attention is the EU...
30 views0 comments
Sec-Blogger
Nov 10, 20192 min read
Are you thinking linearly or exponentially?
We live in an exponential world. So, what does that mean? Last week at the Microsoft Ignite 2019, we heard from Satya Nadella talk about...
13 views0 comments
Sec-Blogger
Nov 3, 20192 min read
DevSecOps, What is it?
DevSecOps is the philosophy of integrating security practices within the DevOps process. DevSecOps involves creating a 'Security as Code'...
17 views0 comments
Sec-Blogger
Oct 26, 20194 min read
How to manage non-corporate devices and prevent data exfiltration?
As mobile devices (which include laptops, Macs, iPads and Android devices) have become an increasing security risk, many companies have...
38 views0 comments
Sec-Blogger
Oct 19, 20193 min read
Two things to help protect your Workforce: Cybersecurity Training and MFA
Organizations consistently struggle with the need to maintain Cybersecurity. As posted in an article by TechRepublic: Top 5 cybersecurity...
16 views0 comments
Sec-Blogger
Oct 13, 20193 min read
What is Information Protection, and how to implement
In the 19th century, the protection of corporate assets meant locking the cash in a strongbox, putting it on the stagecoach, and arming...
11 views0 comments
Sec-Blogger
Oct 5, 20193 min read
Why Zero Trust Framework and what is it
Zero Trust Framework refers to security concepts and threat models that no longer assumes that actors, systems, or services operating...
34 views0 comments
Sec-Blogger
Sep 28, 20193 min read
4.9 million records impacted with DoorDash data breach
DoorDash data breach
20 views0 comments
Sec-Blogger
Sep 21, 20197 min read
Simple Guidance in How To Secure Your Organization Using CIS 20 Controls.
With the increasing number of data breaches every year, it becomes crucial for every organization to ensure that they have all the...
23 views0 comments
bottom of page