As cybersecurity threats continue to become more sophisticated, the role of Chief Information Security Officers (CISOs) has become increasingly important. CISOs must navigate a constantly...
We are thrilled to share the news of an upcoming book signing event at this year’s Wild West Hackin’ Fest (WWHF) conference in Deadwood, South Dakota, on Friday, October 20,...
Data security is a top concern in today’s digital age. Your email provider’s Data Loss Prevention (DLP) policy protects against data breaches and Business Email Compromise (BEC) attacks.
I came across the term “Field CISO” and wondered what a Field CISO does. Is it sales and account management or just consultation? Is it vendor-centric? Are the goals of...
You may have gotten the following Out Of Office (OOO) messages from business contacts several times in your professional career after emailing them. See if you can spot any information...
While QR codes have been around for a while, this is the first time I’ve seen this phishing technique used in a real attack. Attackers are sending users QR codes...
During the creative process of writing The Phantom CISO, one of the questions we discussed was, “How are we going to publish?” It’s no surprise that many authors contemplate this...
There has been concern within organizations regarding the use of ChatGPT, as some employees may input personal or confidential information into the platform’s interface. The concern is that this information...
As organizations continue to rely on technology and digital infrastructure, the threat of cyber-attacks has become increasingly prevalent. This has placed a significant responsibility on Chief Information Security Officers (CISOs)...