Tag: Guest articles


  • Note to Cyber Startups: The First $3M is the Hardest

    Note to Cyber Startups: The First $3M is the Hardest

    Join Us Now One of my favorite books from the Awesome Eighties was Getting by on $100,000 a Year (and Other Sad Tales) by business writer Andrew Tobias. The implication of the book’s title, coined four decades ago, was that a hundred-K should be an impressive enough salary to keep even the toniest Upper West Side Yuppies…

    Continue Reading

  • Simon Longbottom, Vice President of Digital Media for Business at Adobe: Keeping Employees Engaged and Motivated Over the Long Term

    Simon Longbottom, Vice President of Digital Media for Business at Adobe: Keeping Employees Engaged and Motivated Over the Long Term

    Join Us Now As the global health crisis nears its one-year anniversary, a top priority for many executives and managers is determining effective ways to keep employees engaged and motivated over the long haul. A recent survey of more than 150 CIOs, CISOs and business technology executives conducted by HMG Strategy reveals that 73 percent…

    Continue Reading

  • Cloud Application Resilience for Modern Enterprises

    Cloud Application Resilience for Modern Enterprises

    Join Us Now The first time I used a computer was during my sophomore year in college. This is significantly later than computer, engineering, or science-educated people in my age group used a computer for the first time—because I was a music major, not because I am that old. Anyway, at the time I was dating an…

    Continue Reading

  • Critical Infrastructure Attack Reveals Why Access Should be The Nexus of Your Security Program

    Critical Infrastructure Attack Reveals Why Access Should be The Nexus of Your Security Program

    Join Us Now A cyber attack against a Tampa, FL water treatment plant is the latest reminder that security control of critical infrastructure must continually improve. According to a report by Reuters, a cyber criminal gained unauthorized access to an employee’s TeamViewer application (remote access and desktop support software)i and then used the access to gain…

    Continue Reading

  • Want to Stop Nation-State Cyber Threats? Simplify.

    Want to Stop Nation-State Cyber Threats? Simplify.

    Join Us Now John Von Neumann once made the following assertion: For small mechanisms, it’s easy to see how they work, but not what they do. In contrast, for large systems, it is easy to see what they do, but not how they work. Based on nearly forty years in cyber security, I’ve come to view this as the central challenge in securing…

    Continue Reading

  • How to Stand Out in a Commodity Market

    How to Stand Out in a Commodity Market

    Join Us Now When you think about commodity markets, what categories come to mind? Oil? Gas? Metals? Corn? Coffee? And when you think about these categories, what are some attributes of each that contribute to their designation as a commodity? Uniformity? Fungibility? High demand? Necessity? Price fluctuation? All of the above?  There are probably finance…

    Continue Reading

  • The Growing Obsolescence of Credentials (A Guest Article by Jim Routh)

    The Growing Obsolescence of Credentials (A Guest Article by Jim Routh)

    Join Us Now Back at MIT in 1960, Fernando Corbato developed the password while establishing the Compatible Time-Sharing System (CTSS), enabling file permissions to registered users. Sixty years later, User IDs and passwords have served enterprise security remarkably well. Credentials [user IDs and password combinations] remain the predominant method for enabling on-line authentication today on the vast…

    Continue Reading

  • Cyber Security Witch Hunts

    Cyber Security Witch Hunts

    Join Us Now Amidst an epidemic, anger toward outsiders, and simmering hatred between communities of varying affluence, the residents of now Danvers, Massachusetts decided in 1692 to hunt down and blame their sad troubles on a bunch of witches. Culminating in the now-famous Salem Witch Trials, nearly a score of supposed witches including the unfortunate…

    Continue Reading

  • Meredith Harper, VP CISO, Eli Lilly and Company: It’s Time to Talk Honestly About Diversity, Equity and Inclusion

    Meredith Harper, VP CISO, Eli Lilly and Company: It’s Time to Talk Honestly About Diversity, Equity and Inclusion

    Join Us Now Racial injustice has come to the forefront of the national discussion in 2020, prompted, in part, by the George Floyd protests in Minneapolis and Black Lives Matter demonstrations in other cities and communities. One of the positive outgrowths from this is the heightened focus on Diversity, Equity and Inclusion (DEI) programs within…

    Continue Reading

  • How Do We Tell Cyber Security Truths That Might Hurt?

    How Do We Tell Cyber Security Truths That Might Hurt?

    Join Us Now In 1975, Edgser Dijkstra penned an iconic essay entitled “How Do We Tell Truths That Hurt?” In his piece, Dijkstra scolded the computing community for choosing to ignore several obvious facts. While answering endless ridiculous questions about the SolarWinds hack this past week, I decided it was time to re-read the master’s note. As I’d suspected, the parallels lined…

    Continue Reading

Join Us
Register to join our Executive Leadership Network & Newsletter.








Powered by