First off lets define what technical debt is, specifically when looking at it through the lens of a CISO. Technical debt, in with this context, refers...
In a recent security breach that sent shockwaves through the automotive industry, researchers discovered a vulnerability that allowed them to remotely hijack Kia and Hyundai vehicles...
Automatic tank gauges (ATGs) are indispensable tools for monitoring and managing critical infrastructure, such as fuel storage, water reservoirs, and chemical tanks. However, these systems are...
Are you still using older versions of Windows? Microsoft has announced that they will be discontinuing support for certain Windows operating systems in January 2025. This...
NIST has dropped its recommendations for complex passwords, mandatory reset rules, and account lockout policies. These changes mark a significant shift in password security and reflect...
A Chief Technology Officer (CTO) is more than just a technical wizard. They are the strategic architects who shape the technological future of an organization. While...
In an era of increasing global interconnectedness and rapid technological advancements, organizations face a myriad of risks, including systemic ones. These are large-scale events that can...
The security of your supply chain and 3rd parties cannot be overstated especially when they have access to Personal or Privileged information. Although its exceptionally difficult...
Recent Comments