Cybersecurity blog

News, articles and thought leadership.

Recently published blogs

Though Zero Trust is here to stay, that doesn’t mean implementation is easy. Rob Maas is one of the leading Zero Trust consultants and the Field CTO at ON2IT. In this blog series, he’ll provide background and tips based on his years of practical experience implementing Zero Trust.

In our interconnected digital age, robust cybersecurity is as much about understanding what you’re defending as it is about the intricacies of the defenses themselves. Think of digital assets as a vast castle.

Many companies don’t stop to think about the status of their cybersecurity until a problem arises. Whether it’s a sudden transition to remote work or the abrupt implementation or alteration of compliance guidelines, the moment to then start thinking about your cybersecurity will already have passed.
Cyber Resielience

In the digital age, where the fabric of our interconnected world is woven with threads of data and technology, the imperative for cyber resilience has never been more urgent.

As a CISO, or a head of IT: how do you appeal to the board to make sure they understand the value of good cybersecurity? In this blog, we offer some guidelines in the shape of a fictional speech to the board. Thank you for giving me the opportunity to … Read more

The shortage of staff in the IT market is nothing new: companies struggle to find and maintain good IT staff, a lack of specific knowledge and skills amongst IT staff makes a large number of job ads hard to fill and it’s becoming more and more normal to regularly switch jobs.

Return on Investment (ROI) in the context of cybersecurity measures is a hot subject. Which makes sense, as technology providers don’t want to position cybersecurity as a cost with no return. But how accurate is that discussion?

Software has vulnerabilities that provide hackers with the opportunity to steal data, install ransomware or sabotage your business. Criminal organizations and intelligence services are willing to pay a lot of money for vulnerabilities that (almost) no one knows about. Big bucks (or rather, cryptos) are paid for these zero-days on the so-called dark web, because they offer you an open backdoor just for you

A partner who just collects alerts and then makes leaves fixing the problem in your hands, doesn’t actually get you anywhere. It’s comparable to a security service that sends you a quick message: we received a report of a break-in at your office: good luck with that!

Strangely, most companies, including larger organizations, have set up their cybersecurity according to the above pager duty model. Truly incomprehensible, as cold statistics tell you that ransomware, data theft or cyber sabotage are a great threat to continuity than the traditional calamities that we do adequately deal with.

The main items I’ve found to be of interest are the scale at which attacks against APIs have grown (+192% from 2022), the reiteration of the fact that attackers do not care about the OWASP Top 10 and the focus on Open Source Software (OSS). Why Open Source is great … Read more

In part II, John shares insights into both his experience working at Forrester and his contribution to the President’s National Security Telecommunications Advisory Committee (NSTAC) Draft on Zero Trust and Trusted Identity Management.  He also highlights an unexpected but important consequence to Zero Trust.

John Kindervag, founder of Zero Trust, was interviewed by VentureBeat to share his insights into how the adoption of Zero Trust is progressing across organizations and governments globally and what he sees as essential to its growth.

Whether the ultimate objective is data theft, ransomware deployment, cryptocurrency mining, or another nefarious scheme, successful zero-day attacks can cost organizations millions of dollars. Fortunately, by adopting a Zero Trust architecture and implementing extended detection and response (XDR), organizations can reduce the impact of zero-day attacks and block many attacks … Read more

The world of cybersecurity continues to have a battlefield littered with sucking chest wounds that go untreated. We are too passive. Too afraid of action. Too intimidated to do the right thing for our organization. There are a ton of excuses for this…
Previous 1…3456 Next

KEEP UP WITH

OUR LATEST RESEARCH

Name(Required)
Email(Required)