Contact

Is Zero Trust Attainable If You’re Not Google?

Zero Trust as a concept has become almost fashionable, if not perceived to be routine, with the consequence of setting an unrealistic expectation that it is a table-stakes capability for any organization serious about cybersecurity. In part this is driven by the natural erosion of the security perimeter as more users work from anywhere and […]

Read More
Created with Sketch.
Position Paper

Navigating the California Consumer Privacy Act

Passed into California law on June 28th, 2018, the CCPA is the strongest privacy legislation enacted in any state at the moment, giving more power to consumers in regards to their personal data. At its core, it aims to provide consumers with the right to know what information businesses collect about them, to tell a […]

Read More
Created with Sketch.
Position Paper

Nudging for Cybersecurity

Why do security awareness trainings fail to impact employee behavior, and how can nudging help? All too often, cybersecurity is perceived to be overwhelmingly technical in nature. However, Information Security professionals would be wise to keep in mind the words of security expert and cryptographer Bruce Schneier: “Only amateurs attack machines, professionals attack people”. Security […]

Read More
Created with Sketch.
Position Paper

Time & Motion in the Age of Agile

“Measurement is the first step that leads to control and eventually to improvement. If you can’t measure something, you can’t understand it. If you can’t understand it, you can’t control it. If you can’t control it, you can’t improve it.” H. James Harrington Velocity Overlooks Measurement In modern business, there has been an increase in […]

Read More
Created with Sketch.
Position Paper

Structuring the Information Security Organization

Keeping up with the Evolving Landscape The continued evolution of enterprise threats has made Chief Information Security Officers (CISOs) consistently seek better opportunities and strategies to defend the perimeter and drive action given scarce resources. Pioneering CISOs capitalize on the opportunity to mitigate threats by optimizing their organizational structure in a manner where defensive and […]

Read More
Created with Sketch.
Position Paper

Cyber War Games and the Role of the Purple Team

Read More
Created with Sketch.
Position Paper

Enterprise Cybersecurity Risk Remediation

As large organizations grow and mature, they will often find themselves facing similar challenges in proactive risk management and remediation – particularly in the realm of cybersecurity. While information technology companies have historically been the most aware of cybersecurity risk, they remain exposed to threats to their products, services, network, systems, and data. These organizations […]

Read More