Blog

CISO, vCISO

The Advantages of Hiring a vCISO Vendor vs. an In-House CISO

You need someone to manage your business’ security program, and while this is a necessity, you have options for how you choose to protect your assets. 

For most companies, they either hire a Chief Information Security Officer

Read More

CISO, vCISO

What to Expect When Using a CISO as a Service

We’ve found that some companies resist utilizing a CISO as a Service because they ultimately aren’t sure what to expect. They’ve heard that

Read More

CISO, vCISO

5 Signs It's Time to Start Using a CISO as a Service

You’re busy at work, focused on meeting daily deadlines and on achieving your overall mission. But while you’re laser-focused on your day-to-day tasks and long-term goals, who’s worrying about your

Read More

CISO, vCISO

5 Ways vCISO Can Turbocharge Your Sales Team

Sales are complicated. You’re not just articulating the facts about your product or service, you are also navigating emotions and perception to get the deal closed. In a tech setting, that’s about building trust

Read More

CISO, vCISO

How to Get the Most Out of a CISO as a Service

You’ve been weighing the advantages of hiring a CISO as a Service (CISOaaS) over hiring an internal team and finally decided that a professional ...

Read More

Risk Assessment

What is a Security Risk Assessment & Why is it Important?

When it comes to security risk assessments, it’s often unclear what you’ll really receive. Providers use meaningless and misused buzzwords, and ...

Read More

CISO, Security Program

Social Engineering in the Retail Industry

The retail industry is one of the most crucial pillars propping up the United States’ economy. Without it, approximately 42 million Americans—a ...

Read More

Security Program

WPA3 for WiFi is here! Almost.

Choosing the correct form of encryption will always be a game with moving goalposts. Encryption algorithms and associated transport protocols ...

Read More

Penetration Testing

Social Engineering Within Pentesting

Pentesting the People; social engineering is an easy vulnerability When it comes to penetration testing of an enterprise, you instantly think ...

Read More

PCI DSS

Changes to SAQs for PCI DSS v3.2.1

Last month I wrote about the new PCI DSS standard version 3.2.1 and how nothing of significance had changed. Though that remains true, the ...

Read More