Techstrong Adds Two Industry Luminaries

DevOps pioneer and author John Willis and cybersecurity leader Shira Rubinoff join the team at Techstrong Group Boca Raton, FL, June 21, 2023 — Techstrong, the power source for people and technology, ...
Security Boulevard
Bad Bots Beware: BotBusters Are Evolving Too

Bad Bots Beware: BotBusters Are Evolving Too

Celebrating the 25 BotBusters who earned promotions & mobility in Q1 2023! Learn what three BotBusters have to say about their recent transitions with DataDome ...

The Importance of Trust in your Insider Risk Program

A hydrologist will tell you water runs downhill. The same goes for policy decisions within companies, regardless of size. If leadership isn’t investing in an initiative beyond their initial messaging, then the ...
Blocks with the word trust

Trust But Verify – Part 2

Trust But Verify – Part 2   What if I told you you could install a new cybersecurity habit this week? What if I told you this habit was borrowed from a ...
Spotlight: The Voices of Women at DataDome on Leadership

Spotlight: The Voices of Women at DataDome on Leadership

Members of DataDome's DE&I Women Empowerment Pod talk career development and advocating for yourself in terms of growth opportunities ...
ask chloé career project management business security

Survey Reveals Limits of CISOs’ Management Experience

A global survey from recruitment firm Marlin Hawk that polled 470 CISOs at organizations with more than 10,000 employees found nearly half (45%) have been in their current role for two years ...
Security Boulevard
Finger pointing at screen with the words insider threat

What are Insider Threats in Cybersecurity?

| | career, Leadership, lessons learned
What are Insider Threats in Cybersecurity? An Insider Threat in cybersecurity occurs when someone who has access chooses to or gets tricked into using that access to harm your company. Insider Threats ...
How to build a cyber capable board

How to build a cyber capable board

Photo by Benjamin Child on UnsplashIn just a few years, cyber has transformed from the nerd in the corner into the Kim Kardashian of risk. Everyone, it seems, has an opinion on the ...
CISO Stories Podcast: Communications Before, During and After a Breach

CISO Stories Podcast: Communications Before, During and After a Breach

Figuring out what to do after a breach is the wrong time to start the planning process. Communications strategies must be in place well beforehand and there are many benefits to the ...
CISO Stories Podcast: Did You Ask For (and Get) Too Much Security Budget?

CISO Stories Podcast: Did You Ask For (and Get) Too Much Security Budget?

It seems CISOs are typically lamenting that the security budgets are insufficient. While this can represent a significant problem in achieving information security goals, what happens when you get the funding you ...