• Applying Zero Trust with Zero Exceptions

    On July 28, I had the privilege of moderating a fascinating webinar discussion focused on Zero Trust with two of the leading experts in this space. John Kindervag, a.k.a. ‘The Godfather of Zero Trust,’ created the concept of Zero Trust as a Forrester Research analyst in 2010.

  • HMG Strategy Market Update and Tech News Digest

    Investors continue to wrestle with uncertainty, inflation and escalating geopolitical risk. Tesla crushes earnings estimates. Discover this - and more - in the latest HMG Strategy Market Update and Tech News Digest.

  • Those Who Don't Fight Worry Die Young

    My title is from Alexis Carrel, the 1912 Nobel Prize winner in Medicine. While his warning was made a century ago, the message remains true: Worrying is not healthy.

  • The IoT Security Blindspot

    Handling this problem is very different than securing corporate-owned laptops or phones connecting to an on-premises network, and enterprises are now seeking ways to manage the Internet of Thing (IoT) landscape.

  • Sell Me This Firewall

    Instead, to sell firewalls, and MFAs, and SIEMs, and UEBAs, and the like – the salesperson must learn a different method. And if you clip and mail the coupon below, along with a check made out to me for one-hundred and fifty dollars, then I will share with you my incredible secret to selling cyber security solutions!

  • Do Not Respond to Fake Contracts

    Perhaps someone at Google might explain the following: Suppose that a new Gmail account is established with a portion of the user ID seemingly matching some company name. Maybe the new account is, or something like that. If that account suddenly starts blasting out PDF attachments that resemble fake contracts, then why don’t your filters drop the send? (I’ll hum the Jeopardy tune, while you think.)

  • Randomized Rethinking of Anti-Virus

    The 1973 Chevrolet Impala has a unique history: Originally a top-seller for GM during the waning years of Nixon's Administration, the full-sized vehicle surged in retro-interest during the 90s when it appeared as Kramer’s car on Seinfeld. This seems less noteworthy, however, than the fact that it was also one of the first cars to include an airbag. This design decision was much debated within GM, however, because airbags emphasized crashes over speed.

  • The Who and What of Email Security

    In the days of circuit-switched telephony, when Grandma dialed Grandpa, the phone company could easily determine that the caller’s identity was, in fact, Grandma. Such confidence melted away, however, with TCP/IP and the Internet. That is, when Kahn and Cerf decided to allow senders, instead of the network, to specify their identity, they created a flexible Internet protocol – but also one that required add-on overlays for authentication.

  • Chained Breach Simulation

    The first time I saw signatures used to detect attacks more than two decades ago, I knew that intrusion detection systems (IDS) would become a new protection category. It was thrilling to see a new security control come to life, and I give credit to the Air Force Information Warfare Center for leading the way on practical implementation. I became so enthused with IDS that I spent a year writing a textbook on the topic.

There has never been a more exciting time to be a technology executive.

Today’s technology executive plays a pivotal role in helping his or her organization respond to these forces of change. In essence, they serve as conductors to orchestrate the three pillars of organizational success – people, processes, and technology – and to draw upon their unique view of the enterprise to bring these elements into harmony.


The Strongest Executive Leadership Network

© 2022 HMG Strategy, LLC. All Rights Reserved.