
A guest writer of WEI, see Bill Frank’s biography and contact information at the end of this article. Michael Lewis coined the term, Moneyball, in his eponymous book published in…
A guest writer of WEI, see Bill Frank’s biography and contact information at the end of this article. Michael Lewis coined the term, Moneyball, in his eponymous book published in…
Cybersecurity has become one of the most critical aspects of modern business operations, especially for IT executives tasked with safeguarding their organization’s digital assets. As cyber threats evolve in complexity…
The goal of every security organization is to protect its data. This mission has become increasingly complex in the face of an expanding attack surface and increasingly sophisticated and frequent…
Time is a precious commodity, something that most people wish they had more of. This includes the security operations center (SOC), as analysts are constantly under pressure to stay ahead…
Imagine this: you’re a security analyst on the frontlines of your organization’s cybersecurity team. You stare at your monitor as alerts flood from various security programs, like alarms all going…
Bad actors are waging increasingly sophisticated and frequent attacks, including ransomware, cyber espionage, zero-day malware and fileless attacks, to exploit endpoint vulnerabilities. These rapid-fire, diverse attacks are generating an average…
As business leaders outside of IT continue accepting cybersecurity as a business strategy rather than just as a digital defense mechanism, there are still major vacancies in the cybersecurity personnel…
See Bill Frank’s biography and contact information at the end of this article. [Note: This is an updated version of the original article posted on March 21, 2024. I replaced…
See Bill Frank’s biography and contact information at the end of this article. [Note: This is an updated version of the original article posted on March 21, 2024. I replaced…
Inside our IT bubble, leaders are aware of the cybersecurity skills shortage that plagues enterprises. As concerning as this challenge is, it may come as a surprise to the general…
As threat actors get more sophisticated and aggressive campaigns become more commonplace, it is imperative that corporations step up their game. In the age of artificial intelligence (AI), machine learning…
As the 2024 New Year has arrived, so does the opportunity to make educated predictions for what the future holds for cybersecurity. Fundamentally, a cybersecurity strategy is an integral component…
Today’s discussion on sustainability is increasingly prevalent in ongoing dialogues, touching on varied issues from governmental budgeting practices to environmental concerns over global population growth. The state of sustainability is…
Investors with significant stock in public companies expect a high level of disclosure on information concerning new market competitors, shifts in product demand, and operational disruptions stemming from either natural…
Cyber threats are in a constant state of evolution, posing a danger to organizations of all sizes, from the largest of enterprises to small and medium-sized businesses. All face heightened…