GUEST ESSAY: Why it’s high time for us to rely primarily on passwordless authentication

GUEST ESSAY: Why it’s high time for us to rely primarily on passwordless authentication

Accessing vital information to complete day-to-day tasks at our jobs still requires using a password-based system at most companies. Related: Satya Nadella calls for facial recognition regulations Historically, this relationship has been ...
GUEST ESSAY: Dialing in generative AI to truly relieve and assist cybersecurity professionals

GUEST ESSAY: Dialing in generative AI to truly relieve and assist cybersecurity professionals

As the threat of cybercrime grows with each passing year, cybersecurity must begin utilizing artificial intelligence tools to better combat digital threats. Related: A call to regulate facial recognition Although AI has ...
GUEST ESSAY: Taking a fresh approach to user management — to stop privileged access abuse

GUEST ESSAY: Taking a fresh approach to user management — to stop privileged access abuse

To be productive in an interconnected work environment, employees need immediate access to numerous platforms both on- and off-premises. Related: Why SMBs need to do PAM well Keeping track of user activity ...
GUEST ESSAY: The key differences between ‘information privacy’ vs. ‘information security’

GUEST ESSAY: The key differences between ‘information privacy’ vs. ‘information security’

Information privacy and information security are two different things. Related: Tapping hidden pools of security talent Information privacy is the ability to control who (or what) can view or access information that ...
GUEST ESSAY:  Using generative AI to support  — not replace — overworked cybersecurity pros

GUEST ESSAY: Using generative AI to support — not replace — overworked cybersecurity pros

As the threat of cybercrime grows with each passing year, cybersecurity must begin utilizing artificial intelligence tools to better combat digital threats. Related: Leveraging human sensors Although AI has become a powerful ...
Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

Cyber threats have steadily intensified each year since I began writing about privacy and cybersecurity for USA TODAY in 2004. Related: What China’s spy balloons portend A stark reminder of this relentless malaise: ...
GUEST ESSAY: A primer on NIST 207A — guidance for adding ZTNA to cloud-native platforms

GUEST ESSAY: A primer on NIST 207A — guidance for adding ZTNA to cloud-native platforms

Zero trust networking architecture (ZTNA) is a way of solving security challenges in a cloud-first world. Related: The CMMC sea change NIST SP 800-207A (SP 207A), the next installment of Zero Trust ...
GUEST ESSAY: A roadmap for wisely tightening cybersecurity in the modern workplace

GUEST ESSAY: A roadmap for wisely tightening cybersecurity in the modern workplace

Hackers can hurt your business or organization in many ways. First and foremost, cyberattacks can lead to data breaches in which sensitive information is stolen. If a cyber-criminal uses you as a ...
GUEST ESSAY: How to close the skills gap by dipping into hidden pools of cybersecurity talent

GUEST ESSAY: How to close the skills gap by dipping into hidden pools of cybersecurity talent

There is no doubt there is a constant and growing concern amongst CEO’s, and particularly CISO’s, concerning the hiring of the cybersecurity talent their organizations require to safeguard against cyberattacks. According to ...
GUEST ESSAY: Making the case for leveraging automation to eradicate cybersecurity burnout

GUEST ESSAY: Making the case for leveraging automation to eradicate cybersecurity burnout

The rising complexity and prevalence of cybersecurity threats are making experts anxious. Related: Training employees to mitigate phishing It pressures working analysts to perform 24 hours’ worth of work in an 8-hour ...