As organizations grow, functions that started as one person’s job get split across multiple organizational units and multiple executives, often without thoughtful planning. Specialization enables experts to dig deep into each job but creates several problems: A lack of a single accountable executive (or worse, having multiple executives, each of whom manages part of the…

If you’re concerned about the increased threat of cyberattacks by state-sponsored hackers and hacktivist groups in the current geopolitical atmosphere, you’re certainly justified. Criminal groups are emerging from the shadows and pledging their allegiance to Russia. They’re conducting reconnaissance attacks and coalescing into the roles they’ll play in the global cyberwar many see on the…

You might have the luxury of time when planning for a vacation, but cybersecurity teams do not have the time to hunt in the wrong haystack when responding to security incidents. Every second matters in the wake of an intrusion detection, as threat actors move quickly from the first breach point to various other points…

This is a result of basic mechanics: “When one object exerts a force on a second object, the second one exerts a force on the first that is equal in magnitude and opposite in direction.” In cyber, it means that when defenses get stronger, attackers get more sophisticated; and when attackers get more sophisticated, defenses…

For years, it seems like we’ve been rationalizing why your company’s Chief Information Security Officer (CISO) deserves a seat at the boardroom table. In many industries, we’ve come a long way since then. At more and more organizations, CISOs have stepped up and begun conferring regularly with the CFO, CTO, and CEO on security strategy,…

If you didn’t think the agriculture and food sector is of national security significance, then the issuance of the Insider Risk Mitigation Guide by the National Counterintelligence and Security Center (NCSC) in conjunction with the Department of Defense’s Center for Development of Security Excellence (CDSE) should be the equivalent of the bat-signal shining over Gotham….

The more things change, the more they stay the same. Despite a changing threat landscape and threat actors who keep upping their game, the vulnerabilities behind the threats remain consistent. The OWASP Top 10, ranked by the Open Web Application Security Project, lists the 10 most prominent and dangerous risks and threats for applications. The OWASP…

The round was led by Prefix Capital and ForgePoint Capital, with participation from Accenture Ventures, as well as individual investors Tom Gonser, founder of DocuSign; Omkhar Arasarathnam, engineering director at Google Cloud; Bob Gleichauf, EVP at InQTel and ex-CTO at Cisco; David Tsao, VP of security engineering at Marqeta; and Sameer Sait, CISO at Amazon…