Syndicated Blog

CISO Global
Cybersecurity is a Culture, Not a Product
Who You Gonna Call? For Incident Response and image of author beside cyber criminal in red "no" symbol

Who You Gonna Call? For Incident Response

| | Blog Posts
Gary Perkins, Chief Information Security Officer  Globally, no organization is immune to attack. Cybersecurity threats are a reality and every organization, anywhere in the world, is a potential target, regardless of location ...
The Weakest Link: Securing The Human Element From Cyberattack Image of author and an arm removing a red wooden person from a set

The Weakest Link: Securing The Human Element From Cyberattack 

| | Blog Posts
By: Chris Clements, VP of Solutions Architecture The Problem  As humans, we tend to trust the people around us in most situations simply by default. We usually don’t assume that the cook ...
Balanced IT: Humanizing AI in Client Experience, Tigran Safari

Balanced IT: Humanizing AI in Client Experience 

| | Blog Posts
By: Tigran Safari, Client Experience Manager, Secured Managed Services How can we clear our minds of preconceived notions about Artificial Intelligence? How can we approach this ongoing technological revolution without apprehension? AI ...
CMMC 2.0: Your Questions Answered — Tom Cupples, author, blog image

CMMC 2.0: Your Questions Answered

| | Blog Posts
By: Tom Cupples, Ed.D., CISSP, CGRC, PMP, CAICO-PI, CCP, CCA, Sec+, Net+, Security Controls Assessor & Senior Cybersecurity Trainer at CISO Global, Inc. By now, you are likely aware that the Cybersecurity ...
Cybersecurity Risks and Vulnerabilities with Third-Party Vendors

Cybersecurity Risks and Vulnerabilities with Third-Party Vendors 

| | Blog Posts
By Chris Clements, Vice President of Solutions Consulting Third-party vendors, contractors, and partners are often an integral part of an organization’s operations. However, they can also pose significant security risks if not ...
Mobile Matters: Keep Your Data Safe, Author Thomas Coffee in front of digital devices

Mobile Matters: Keep Your Data Safe

| | Blog Posts
By Thomas Coffey, VP of Security at CISO Global Some of you may remember when phones were primarily used for making phone calls. In today’s rapidly evolving digital landscape, our smartphones and ...
Cybersecurity Warranties? Absolutely!

Cybersecurity Warranties? Absolutely!

| | Blog Posts
By: Rob Hegedus, CHECKLIGHT® Program Director Insurance is for something that might happen (a question of probability). A warranty is for something that will happen (a question of time).  After thirteen years in ...
Back to the Basics: Security Must-Haves for 2024, Part II Blog Image

Back to the Basics: Security Must-Haves for 2024, Part II 

| | Blog Posts
By: Gary Perkins, Chief Information Security Officer Welcome to Part II of the Basics of Security. If you missed the first part of the series, you can read it here. There is ...
Strengthening Cybersecurity in Local Government: Blog Image

Strengthening Cybersecurity in Local Government: How to Protect Networks Amid an Epidemic

| | Blog Posts
By: Randy Griffith, Senior Security Consultant, Strategy and Risk In the ever-evolving cybersecurity landscape, organizations are constantly striving to enhance their defenses against organized malicious actors. As cyber attacks become more advanced, ...
Tom Cupples blogimage OIRA Releases CMMC Proposed Rule

OIRA Releases CMMC Proposed Rule 

| | Blog Posts
By: Tom Cupples, Ed.D., CISSP, CGRC, PMP, CAICO-PI, CCP, CCA, Sec+, Net+, Security Controls Assessor & Senior Cybersecurity Trainer at CISO Global, Inc.   On December 26, 2023, the Office of Information and ...