Category: technical

Strengthening Email Security with DLP Policies

Data security is a top concern in today’s digital age. Your email provider’s Data Loss Prevention (DLP) policy protects against data breaches and Business Email Compromise (BEC) attacks.

The OOO Leak

You may have gotten the following Out Of Office (OOO) messages from business contacts several times in your professional career after emailing them. See if you can spot any information...

QR Code Phishing

While QR codes have been around for a while, this is the first time I’ve seen this phishing technique used in a real attack. Attackers are sending users QR codes...

Technical vs Business Skills

As a CISO (Chief Information Security Officer), you are responsible for ensuring the security and integrity of your organization’s information systems and data. This is a critical role that requires...

Powershell Script: Password expiration notifications

It’s a good idea to have a password expiration policy, but how will users know it’s time to change their password? Maybe it expires when they are on vacation or...

Powershell Script: Vulnerability Scan Report — Check the KEV

As part of a vulnerability management program its important to run a vulnerability scan of your systems on a regular basis. When the scan is complete there are usually thousands...

Category: security

Strengthening Email Security with DLP Policies

Data security is a top concern in today’s digital age. Your email provider’s Data Loss Prevention (DLP) policy protects against data breaches and Business Email Compromise (BEC) attacks.

Research: What is the role of a Field CISO?

I came across the term “Field CISO” and wondered what a Field CISO does. Is it sales and account management or just consultation? Is it vendor-centric? Are the goals of...

The OOO Leak

You may have gotten the following Out Of Office (OOO) messages from business contacts several times in your professional career after emailing them. See if you can spot any information...

QR Code Phishing

While QR codes have been around for a while, this is the first time I’ve seen this phishing technique used in a real attack. Attackers are sending users QR codes...

A CISO Perspective

As cybersecurity threats continue to become more sophisticated, the role of Chief Information Security Officers (CISOs) has become increasingly important. CISOs must navigate a constantly evolving landscape of threats, compliance...

Powershell Script: Password expiration notifications

It’s a good idea to have a password expiration policy, but how will users know it’s time to change their password? Maybe it expires when they are on vacation or...

Powershell Script: Vulnerability Scan Report — Check the KEV

As part of a vulnerability management program its important to run a vulnerability scan of your systems on a regular basis. When the scan is complete there are usually thousands...

Category: pentesting

Automated Pentesting: Can Machines Replace Human Hackers?

Automated pentesting is a new service being offered by a lot of vendors. As more and more companies rely on digital technology for their daily operations, the need for robust...

Category: cybersecurity

Book Launch

The long-awaited arrival of The Phantom CISO has come after 2+ years of unwavering commitment and hard work. This book is an amalgamation of two decades of cybersecurity know-how, serving...

Automated Pentesting: Can Machines Replace Human Hackers?

Automated pentesting is a new service being offered by a lot of vendors. As more and more companies rely on digital technology for their daily operations, the need for robust...

Category: leadership

Research: What is the role of a Field CISO?

I came across the term “Field CISO” and wondered what a Field CISO does. Is it sales and account management or just consultation? Is it vendor-centric? Are the goals of...

The CISO's Immediate Resources

As organizations continue to rely on technology and digital infrastructure, the threat of cyber-attacks has become increasingly prevalent. This has placed a significant responsibility on Chief Information Security Officers (CISOs)...

A CISO's Reach in a Breach

Unfortunately, cybersecurity breaches are becoming more common in today’s digital age, and they can have significant consequences for the impacted organizations. However, it’s important to note that not all breaches...

CISOs and Imposter Syndrome: How to Hack Your Way to Confidence

Imposter syndrome is a pervasive phenomenon that affects people across all professions, including Chief Information Security Officers (CISOs). CISOs are crucial in protecting their organization’s sensitive information from cyber threats....

CISO and CIO: Critical Roles in Effective Cybersecurity Measures

With the growing sophistication of cyber threats, organizations are increasingly placing a premium on effective cybersecurity measures. Two roles that are critical to the success of these efforts are the...

A CISO Perspective

As cybersecurity threats continue to become more sophisticated, the role of Chief Information Security Officers (CISOs) has become increasingly important. CISOs must navigate a constantly evolving landscape of threats, compliance...

Book Launch

The long-awaited arrival of The Phantom CISO has come after 2+ years of unwavering commitment and hard work. This book is an amalgamation of two decades of cybersecurity know-how, serving...

Category: ciso

The CISO's Immediate Resources

As organizations continue to rely on technology and digital infrastructure, the threat of cyber-attacks has become increasingly prevalent. This has placed a significant responsibility on Chief Information Security Officers (CISOs)...

A CISO's Reach in a Breach

Unfortunately, cybersecurity breaches are becoming more common in today’s digital age, and they can have significant consequences for the impacted organizations. However, it’s important to note that not all breaches...

CISO and CIO: Critical Roles in Effective Cybersecurity Measures

With the growing sophistication of cyber threats, organizations are increasingly placing a premium on effective cybersecurity measures. Two roles that are critical to the success of these efforts are the...

Category: cio

CISO and CIO: Critical Roles in Effective Cybersecurity Measures

With the growing sophistication of cyber threats, organizations are increasingly placing a premium on effective cybersecurity measures. Two roles that are critical to the success of these efforts are the...

Category: job

Worst Job Descriptions For A CISO

The position of a Chief Information Security Officer (CISO) is crucial in any organization. The CISO is responsible for protecting the company’s digital assets and ensuring the security of sensitive...

Category: breach

A CISO's Reach in a Breach

Unfortunately, cybersecurity breaches are becoming more common in today’s digital age, and they can have significant consequences for the impacted organizations. However, it’s important to note that not all breaches...

Category: business

Technical vs Business Skills

As a CISO (Chief Information Security Officer), you are responsible for ensuring the security and integrity of your organization’s information systems and data. This is a critical role that requires...

Category: privacy

ChatGPT - Block or Allow

There has been concern within organizations regarding the use of ChatGPT, as some employees may input personal or confidential information into the platform’s interface. The concern is that this information...

Category: policy

Strengthening Email Security with DLP Policies

Data security is a top concern in today’s digital age. Your email provider’s Data Loss Prevention (DLP) policy protects against data breaches and Business Email Compromise (BEC) attacks.

The OOO Leak

You may have gotten the following Out Of Office (OOO) messages from business contacts several times in your professional career after emailing them. See if you can spot any information...

ChatGPT - Block or Allow

There has been concern within organizations regarding the use of ChatGPT, as some employees may input personal or confidential information into the platform’s interface. The concern is that this information...

Category: book

Book Signing at the Wild West Hackin' Fest 2023

We are thrilled to share the news of an upcoming book signing event at this year’s Wild West Hackin’ Fest (WWHF) conference in Deadwood, South Dakota, on Friday, October 20,...

Amazon KDP Challenges

During the creative process of writing The Phantom CISO, one of the questions we discussed was, “How are we going to publish?” It’s no surprise that many authors contemplate this...

Category: career