by Andrea VanSeveren | Apr 22, 2021 | InfoSec Strategies
Reading Time: 3 minutes
A wise CISO once said: “The only thing worse than no cybersecurity guidance is too much cybersecurity guidance.” In today’s world, we are blessed/cursed with multiple, interrelated and cross-referenceable standards of comparable...
by John Verry | Mar 23, 2021 | InfoSec Strategies
Reading Time: 3 minutes
Cyber attacks against higher education institutions continue to escalate, and the reason is simple: these organizations remain vulnerable. Technology use on campus is evolving faster than corresponding data protections, exposing...
by Jeremy Sporn | Dec 15, 2020 | Application Security, InfoSec Strategies
Reading Time: 3 minutes
SaaS providers face information security risk from every direction: from their application code to their software development tools to their networks to their employees. One of the areas with the biggest potential for risk to...
by Jeremy Sporn | Dec 10, 2020 | Application Security, InfoSec Strategies
Reading Time: 2 minutes
Whether the provider is in a startup mode or a well-established leader, cybersecurity is a challenge in the world of software as a service (SaaS). Companies often presume their SaaS environment is secure because it’s hosted on...
by Jeremy Sporn | Dec 9, 2020 | InfoSec Strategies, IoT Security
Reading Time: 2 minutes
When you work in information security, sometimes it feels like you need all the help you can get. But good help that really moves you forward can be hard to find. Often success doesn’t come down to more resources,...
by Jeremy Sporn | Dec 7, 2020 | InfoSec Strategies
Reading Time: 3 minutes
Two engineers and a sales guy walk into a bar. They discuss how to launch a new business and compete with their current employer. Then the sales guy goes home and downloads everything in Salesforce while the engineers grab every...