08 Jun 24 The Role of Diffusion of Responsibility in Major Cyber Breaches Joe Sullivan No Comments Learn how diffusion of responsibility contributes to major cyber breaches, with real-world examples demonstrating its impact on security. Read More
08 Jun 24 The Psychological Principles Behind Cyber Hygiene Failures Joe Sullivan No Comments Uncover the psychological reasons behind the struggle with basic cyber hygiene in organizations and discover effective strategies for improvement. Read More
08 Jun 24 Cyber Deception Tactics Joe Sullivan No Comments Discover how cyber deception tactics can strengthen your cybersecurity defenses by misleading attackers and safeguarding your organization. Read More
07 Jun 24 The Problems with Hacking Back Joe Sullivan No Comments Discover the issues with hacking back after a cyber intrusion, from legal ramifications to ethical concerns and unintended consequences. Read More
07 Jun 24 Lessons from the UnitedHealth Cyber Breach Joe Sullivan No Comments Explore the lessons from the UnitedHealth cyber breach for future security programs, breach experiences, and implications for security leaders. Read More
06 Jun 24 Performing a Self-Review and Setting Your Own Goals Joe Sullivan No Comments Discover effective strategies for performing a self-review and setting personal goals during quarterly reviews to boost your career growth. Read More
05 Jun 24 Why a High-Velocity, No Work-Life Balance Culture is Harmful Joe Sullivan No Comments Learn why a high-velocity work culture lacking work-life balance is harmful and unsustainable for long-term success and employee well-being. Read More
05 Jun 24 Questions Boards of Directors Should Ask About Cybersecurity Joe Sullivan No Comments Learn the essential questions boards should ask about information security and why "How many attacks did we block?" isn't a good metric. Read More
05 Jun 24 Estimating the Cost of a Breach Joe Sullivan No Comments Discover methods to estimate the cost of a breach and justify investment in information security programs to strengthen your cybersecurity. Read More
05 Jun 24 How to Perform a Cyber Risk Assessment on Vendors Joe Sullivan No Comments Discover how to conduct a cyber risk assessment on vendors, utilizing various methodologies and frameworks to ensure security. Read More