Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Identity Under Siege: Responding to the National Public Data Breach

While the scale of this data breach is alarming – with 277 gigabytes of data reportedly stolen – it’s important not to panic. Instead, focus on taking concrete steps to protect yourself. Stay informed, be proactive in safeguarding your personal information, and remain vigilant for any signs of suspicious activity.

A Treacherous Dinner Party: The Global Effort to Maintain Supply Chain Security

…In the world of supply chain security, vigilance is your best friend. Stay informed, stay alert, and always prioritize security in your decisions. After all, in this interconnected digital world, we’re all in this together.

Navigating the Shared Responsibility Model: Lessons Learned from the Snowflake Cybersecurity Incident

September 12, 2024 Jerry Dawkins, PhD In the world of cybersecurity, the recent incident involving Snowflake has sparked a significant discussion around the shared responsibility between vendors and customers. The attacks, which targeted over 100 Snowflake customers, have highlighted vulnerabilities that arise not from the platform itself, but from how customers manage their security environments.

Cyber Insurers Are Not Your Friend - Why a Warranty May Be a Better Option

In this landscape, organizations need a multi-faceted approach that includes prevention, detection, and response capabilities. A warranty tied to a comprehensive security solution supports this approach, providing both technological protection and financial assurance.

Badge Life: The CISO Team Takes on DEF CON

Earlier this month, a group of our intrepid pen testers from our Readiness & Resilience team at CISO Global ventured into the heart of the hacking world at DEFCON 32 in Las Vegas. This annual pilgrimage to the mecca of cybersecurity (and more importantly, hacking) is more than just a conference – it’s a hands-on deep dive into the cutting edge of hacking techniques and defensive strategies.

The Polar Bear in Your Kitchen: A Cybersecurity Analogy

Imagine for a moment that your home has a rodent problem. To address this, you install a fancy system designed to automatically detect and trap animals before they can roam around your house and cause any damage. The system seems to work well; from time to time, you arrive home to find a mouse or a squirrel caught by the device. No big deal, right? Lots of small critters about and the system is working as designed to catch them.

The Cybersecurity Industry is Under Scrutiny Yet Again

Unfortunately, the cybersecurity industry has been in the crosshairs once again due to the global Microsoft outage caused by CrowdStrike’s disastrous software update on July 19th. Coincidentally, just five days following the CrowdStrike issue, the US District Court for the Southern District of New York dismissed a case involving another notable cybersecurity company, SolarWinds.

Visibility in Management: Navigating the Cybersecurity Landscape with Argo | Part II

Jerald Dawkins is the Chief Technology Officer (CTO) for CISO Global and has founded and exited several cybersecurity companies, including True Digital Security and TokenEx, LLC, both based in Oklahoma. (True Digital Security was acquired by CISO Global in January 2022.) He currently holds three (3) patents in the cybersecurity field.

The Beatings Ransoms Will Continue Until Morale Culture Improves

As we near the halfway point of 2024, it is apparent that the epidemic of extortionary cyber attacks will continue unabated into the foreseeable future. Now more than ever, I believe that until organizations adopt cultural approaches to cybersecurity, breaches will continue to wreak havoc on companies and industries. But why is this? There are far too many reasons to enumerate here, but in my experience the biggest factors are.