I'm hijacking the title of a fun little book I read recently by the same title. The point of this post (and the book) is that people have a lot going on. They probably don't want to seek out your writing or your work and read
This post was guest authored by Nikki Robinson. Vulnerability management is complex. It is, to be blunt, no fun at all. Especially in complex and complicated environments, vulnerability management can feel overwhelming. The sheer volume of vulnerabilities released daily into the National Vulnerability Database (NVD), the scores of vulnerabilities and
The Soft Side of Cyber Podcast We launched our first podcast episode on youtube, iTunes, Spotify, and Google Play. Subscribe and give it a listen today! Listen on youtube Technical expertise is super important in our field. But here's the thing: soft skills are just as crucial when
Last week, Rob talked about how to formulate a cybersecurity strategy. This week, we would like to take the next step and discuss ways to implement that strategy. Developing and implementing a cybersecurity strategy is critical for protecting sensitive data, maintaining business continuity, and building customer trust. However, simply having