The cyberattack on Ticketmaster and US Utilities gave us the questions, when is a target too large or small. Let’s find out.
Category: Cybersecurity
Why AI Will Boost Demand For Cybersecurity Talent
When listening to industry watchers extolling the promises of AI, you’d expect cybersecurity experts to soon be obsolete. AI will securely configure systems, detect abnormal behavior and react faster than any human ever can. These predictions all suffer from one glaring omission, though. Humans and human behavior are an essential component of any and all…
Cyberwarfare: Battlefield of the 21st Century
We often see cyberwarfare as a game between nerds in the basement. Yet, the wars in Ukraine and Gaza show, that Boards need to be ready.
Boards Must Be On Top Of The Cybersecurity Culture
Corporate Culture, Talent Pipeline, and Shareholder Value are purviews of board oversight. Find out why boards must increase the oversight of IT departments.
Hidden Tech Debt: The Importance Of Better Updates For Commercial Software
Software doesn’t age like fine wine. Join me at the Forbes Technology Council to find out, why we need to tackle the hidden tech debt.
Blameless Post-Mortem: Down With The Disastrous War Room
A War Room can serve an important purpose in resolving incidents. However, they are not a good setting for post mortems or long term strategies.
It’s in the Culture, Embracing Stereotypes and Eliminating Blame
Many factors within an organization contribute to the stress in IT and cybersecurity. Let us explore how we can improve the culture within the IT department.
Cybersecurity Burnout: Where our Culture went Toxic
IT departments lose thousands of experts to burnout annually. For the 2024 mental health awareness month, let us examine the toxic culture in cybersecurity.
Backups: A Proven Tool for Cyber Resilience
Backups are a crucial part of IT and of any cyber resilience strategy. Join me in exploring what business leaders should ask their IT department about Backups.
How Feedback Loops Strengthen Your Cyber Defenses
Cybersecurity incidents are similar to asymmetrical warfare. Join me at the Forbes Technology Council and find out how to use Feedback loops to improve your cybersecurity.