Blog


| Posted by , under Uncategorized

As a fellow cybersecurity leader, I want to extend my sympathies to George Kurtz, president and CEO of CrowdStrike. It’s clear that the challenges faced are not of his choosing, and he must be under significant pressure during this time. Managing a major cybersecurity company is no easy task, and

| Posted by , under Uncategorized

Ladies and gentlemen, grab your popcorn and settle in, because we’re about to dive into the thrilling saga of the Great Breach Parade! Imagine this: a grand spectacle where public companies, much to their chagrin, are mandated to publish their breaches for the world to see. Yes, you read that

| Posted by , under Uncategorized

In today’s digitally driven world, cybersecurity is paramount. Protecting sensitive data, securing personal information, and ensuring the integrity of systems are crucial responsibilities. However, the cybersecurity industry faces a significant challenge: the lack of standardized guidelines. This absence of guidelines creates confusion for consumers and businesses, leading to misguided investments and

| Posted by , under Uncategorized

In industries like automotive and aviation, transparency is key to maintaining trust and ensuring safety. Historical performance data is readily available, allowing consumers to make informed decisions based on past performance. Cybersecurity, however, remains shrouded in secrecy, even as it plays a critical role in protecting sensitive data and maintaining digital

3 email rule
| Posted by , under Uncategorized

In the fast-paced world of business, effective communication is paramount. Misunderstandings, delays, and inefficiencies can lead to frustration and hinder productivity. One common scenario where these issues arise is in prolonged email threads. To address this, I advocate for a simple yet powerful principle: The 3 Email Rule: By limiting email