Leadership
Techstrong Adds Two Industry Luminaries
DevOps pioneer and author John Willis and cybersecurity leader Shira Rubinoff join the team at Techstrong Group Boca Raton, FL, June 21, 2023 — Techstrong, the power source for people and technology, ...
Bad Bots Beware: BotBusters Are Evolving Too
Celebrating the 25 BotBusters who earned promotions & mobility in Q1 2023! Learn what three BotBusters have to say about their recent transitions with DataDome ...
The Importance of Trust in your Insider Risk Program
A hydrologist will tell you water runs downhill. The same goes for policy decisions within companies, regardless of size. If leadership isn’t investing in an initiative beyond their initial messaging, then the ...
Trust But Verify – Part 2
Trust But Verify – Part 2 What if I told you you could install a new cybersecurity habit this week? What if I told you this habit was borrowed from a ...
Spotlight: The Voices of Women at DataDome on Leadership
Members of DataDome's DE&I Women Empowerment Pod talk career development and advocating for yourself in terms of growth opportunities ...
Survey Reveals Limits of CISOs’ Management Experience
A global survey from recruitment firm Marlin Hawk that polled 470 CISOs at organizations with more than 10,000 employees found nearly half (45%) have been in their current role for two years ...
What are Insider Threats in Cybersecurity?
What are Insider Threats in Cybersecurity? An Insider Threat in cybersecurity occurs when someone who has access chooses to or gets tricked into using that access to harm your company. Insider Threats ...
How to build a cyber capable board
Photo by Benjamin Child on UnsplashIn just a few years, cyber has transformed from the nerd in the corner into the Kim Kardashian of risk. Everyone, it seems, has an opinion on the ...
CISO Stories Podcast: Communications Before, During and After a Breach
Figuring out what to do after a breach is the wrong time to start the planning process. Communications strategies must be in place well beforehand and there are many benefits to the ...
CISO Stories Podcast: Did You Ask For (and Get) Too Much Security Budget?
It seems CISOs are typically lamenting that the security budgets are insufficient. While this can represent a significant problem in achieving information security goals, what happens when you get the funding you ...