CISO

Show
You’ve got a digital strategy, but how are you managing digital risks?
February 7, 2019

Download a free copy of Digital Risk: The C-Suite‘s Critical Missing Part of Overall Risk Most C-level executives I speak …

read more

ShadowTalk Update – XMRig Cryptocurrency Mining, FIN8 Backdoor, and Attacks Against Office 365

June 17, 2019

This week Harrison is joined by Travis and Alec to discuss the security stories of the week including a fileless malware …

read more

Announcing Digital Shadows’ ISO27001 certification

May 7, 2019

I’m pleased to announce that Digital Shadows has recently achieved an important compliance milestone for our customers. After a concerted …

read more

CISO Spotlight: Security Goals and Objectives for 2019

February 7, 2019

I recently joined our ShadowTalk podcast to discuss 2019 planning and prioritization. If you listen, you will notice that I’m …

read more

Leveraging the 2018 Verizon Data Breach Investigations Report

April 10, 2018

Today, the 11th edition of the Verizon Data Breach Investigations Report (DBIR) has been released. This year’s report includes 53,308 …

read more

One CISO’s Recommendations for Making the Most of RSA Conference Sessions

April 9, 2018

Last week, Enterprise Strategy Group (ESG) principal analyst, Jon Oltsik, wrote an article for CSO titled: “RSA Conference: CISOs’ top …

read more

A New CISO Looking to See How Deep the Rabbit Hole Goes

December 12, 2017

Well it is official, I’m now the Chief Information Security Officer here at Digital Shadows. It has been while since …

read more

WannaCry: The Early 2000s Called, They Want Their Worms Back

May 12, 2017

Earlier today it was revealed that the United Kingdom’s National Health Service was targeted by ransomware known as “WannaCry.” Sixteen …

read more

Two Ways to Effectively Tailor Your Intelligence Products

January 17, 2017

In my previous blog, “Trump and Intelligence: 6 ways to deal with challenging intelligence consumers,” I focused on six ways …

read more

5 Takeaways From The “Building A Strategic Threat Intelligence Program” Webinar

July 26, 2016

Last week, the great Mike Rothman (of Securosis fame) and I did a webinar titled: “Building a Strategic Threat Intelligence …

read more

Analyzing the 2016 Verizon Data Breach Investigations Report

May 2, 2016

Last week Verizon released the 2016 Data Breach Investigations Report. If you haven’t read it yet, I highly recommend that …

read more
Start Free 7-Day Test Drive of SearchLight
Start Test Drive