Most enterprise threat intelligence programs didn’t end up where they are by accident. They evolved that way over time. One feed, one tool, one integration at a time. The thought was: more data, more visibility, better security. But then complexity grows until the moving parts are no longer serving the mission. I’ve seen this happen across organizations of all sizes, and on the surface, it looks like progress is happening. ...
Continue Reading...I’ve known Charles Cresson Wood for a long time, both as a trusted business colleague and a friend. You may know him as the creator of the original masterpiece on information security policies over two decades ago: Information Security Policies Made Easy. Charles and I have worked together on a few projects over the years, and what’s always stood out to me is his ability to tie together security, legal, ...
Continue Reading...Inc.com had a piece on AI adoption/perception/strategy recently. I feel that it provides some interesting insight into what's to come as it relates to dealing with employees working for - and against - the business...especially as it relates to sabotaging AI efforts. Lots of things for IT and security leaders and admins to pay attention to that I've summarized here: Challenges in Adoption 72% of C-suite leaders reported significant challenges ...
Continue Reading...