skip to Main Content

Category: Information Security

The Future of Zero Trust: Continuous Authentication

Ask any CISO about a trend that they think will help push security postures forward and you’ll inevitably hear the same thing: the elimination of the perimeter and the rise of the zero trust mindset. In the old perimeter model,…

Sick of high WAF costs?
So are we.

A rapidly growing theme for essentially every CISO I’ve been speaking with these days is: how do we get more from our security controls for less spend. Reducing costs is a good thing for any organization at any time: the…

My Top Five Cyber Security Books

Over the last two years, I’ve read 25+ cyber security books to invest in understanding as many parts of our field (including the history of the industry) as I can. I’ve learned a ton and have been quite entertained in…

Security is a Shared Responsibility

One of the core tenets of National Cybersecurity Awareness Month this year is “Secure It.” But what is “it” exactly? “It” refers to the devices and the accounts you access on those devices. “It” also refers to the overall security…

Securing Technology Innovators’ Web Layer Assets

Move Fast Without Breaking Things For the last fifteen years, Facebook’s motto “Move Fast and Break Things” has been the mantra of technology companies looking to replicate the magic coming out of Silicon Valley and other startup hubs. The idea…

Back To Top