• The importance of apps to businesses Software applications (apps) are at the heart of modern business success and have transformed the way companies handle their operations. A well designed and developed app with user-friendly methodologies and a security and privacy mindset can be very beneficial to a company’s operating, marketing, and sales strategies. Apps benefit businesses in numerous ways, providing credibility, higher productivity, and building trusted relationships with their customers. However, developing an app does not always go as planned. Failures do happen. And when they happen, they create major disruptions and financial losses. Have we learned from past failures? The good thing about failures is that they can be a great source for lessons learned. In application development, learning

    Aug 09,
  • Accelerating Your Security Career Requires More Than Just Paying Attention Many InfoSec professionals have seen so many breaches, whether through personal experience, or in the news, that it becomes apparent that a new approach is needed to combat the existing and emerging threats. Since the cloud is embraced by most organizations, the ability to protect the organization is also changing and becoming an increasingly important capability for the security professional. One way that companies are achieving better security is by creating a resilient security approach. This resilience, especially in the cloud, requires an upgrade to the skills of many security individuals. What better way is there to increase your cloud knowledge and accelerate and extend your career than by earning

    Jul 27,
  • When it comes to compliance in cybersecurity there are many regulations in play, GDPR, CCPA, HIPAA, to name but a few. Whilst you may have to take a key role in these regulations, you need the support and engagement of your organization. One nominated person is not enough. In the case of an InfoSec professional, culture is frequently the difference between a successful, and a failed endeavor. This is especially true when attempting to navigate the many regulations that impact an entity. Trying to find unity in the directives, and often disparate suggestions in many regulations can be a maddening exercise, and it needs everyone to be doing the right thing when no-one is looking. It needs a security mindset.

    Jul 22,
  • Cybersecurity professionals are far more likely to hold vendor-specific certificates than certifications from a vendor-neutral association or standards-based organization, according to the (ISC)² Cybersecurity Career Pursuers Study. But when asked which qualifications they would recommend to cybersecurity newcomers, professionals tend to prioritize vendor-neutral credentials. This preference suggests that even though current professionals followed a more traditional, vendor-specific path when gaining experience in the field (55% of current professionals entered cybersecurity from IT backgrounds), they see greater value in pursuing broader professional qualifications for people starting their careers now. This is a perspective that may be informed by their own lessons learned over the years. Cybersecurity professionals also emphasize the importance of cloud security in recommending certifications for pursuers. This is

    Jul 20,
  • A very common complaint among information security professionals is lack of a budget to implement the best security tools. It may be true that recent newsworthy security events have increased many budgets, yet it never seems like enough.  In many ways, this is true. It is like the difference between the base-model automobile, and the fully equipped model. What easier way is there to grant a system the authority to operate than with the most robust budget imaginable? Yes, it is nice to have all the flashing lights and automated features, but that is not always what is needed to truly meet the requirements. There are many low-cost, and often free aspects of a security program that, if overlooked, can

    Jul 15,