Images Powered by Shutterstock
Driving change with vision

Driving change with vision

Thestory of VaccinateCAis a fascinating one: a small volunteer group that came together, not to do anything other than a form of information arbitrage: finding out where Covid...

Going from Ideas to Reality: Implementing Your Cloud Security Strategy

Going from Ideas to Reality: Implementing Your Cloud Security Strategy

By now, you’ve read Part I of How to CISO in the Cloud, and its accompanying blog. And hopefully, you’ve just read Part II, or you’ll be inspired to read it after reading this....

How to Protect Against SMS Phishing | CSA

How to Protect Against SMS Phishing | CSA

Last year, cloud communications company Twilio announced that its internal systems were breached after attackers obtained employee credentials using an SMS phishing attack....

Security Architecture is Not A Checklist

Security Architecture is Not A Checklist

This is a continuation of my series of posts on Automating Cybersecurity Metrics. In the last post I wrote about architecting a secure solution for automation with MFA. Now...