The road to M&A hell is paved with good (IP-based) intentions By Martyn Ditchburn
TCP/IP-based communications have been the cornerstone of corporate networks for more than 30 years. Organisations like Cisco excelled at training an army of mechanical TCP/IP […]
Talent and Governance, not Technology, are Key to Drive Change around Cyber Security By Jean-Christophe Gaillard
You Are Not Going to Fix Your Cyber Security Problems by Buying More Tech For the last 20 years, large organizations have been spending significant […]
Time to Look at the Role of the CISO Differently By Jean-Christophe Gaillard
What is now required is political acumen, managerial experience and personal gravitas, more than raw technology skills. In spite of being widely used, the role […]
3 Keys to Deal with the Cyber Security Skills Gap By Jean-Christophe Gaillard
Look at it in all its dimensions before jumping to ready-made solutions for the cyber security skills gap You don’t have to go far to […]
Blast radius, cloud sprawl and CNAPP By Martyn Ditchburn
When we closely cluster our data and applications in a single place – the conventional data center – we erroneously believe we can protect it […]
The 3 Traits of Successful Cyber Security Leaders By Jean-Christophe Gaillard
The cyber security transformative urgency in many firms forces to look beyond traditional technology profiles. Cyber security has risen to prominence on the agenda of […]
London Tech Leaders: Cyber security & growth mindset By Abbie Hudson
London Tech Leaders 10: My key takeaways as an attendee. Cyber security is accredited through fear, and as an organisation, how can we protect our […]
Why Cybersecurity is Now a Board-Level Leadership Imperative By Jean-Christophe Gaillard
Supporting cybersecurity and promoting it has now become a plain matter of good leadership. We are not hearing enough about the short tenure of the CISO. Regular studies place […]
Leading by Listening: CISO By Jean-Christophe Gaillard
The times have gone when the CISO had to explain what cyber security was about and the value it brought In the face of non-stop cyber-attacks, and […]
String (cheese) theory of zero trust cybersecurity models By Martyn Ditchburn
I regularly get asked, “How did you drive the change from the traditional data centre and legacy architecture to a new paradigm of 100% cloud, […]
Cyber security knowledge entropy By Glenn Wilson
Often a gap in our cyber security knowledge is filled by attending a security course whose syllabus covers a number of security topics. In the […]
The Cyber Security Parallel Universe By Jean-Christophe Gaillard
It’s about time we go back to basics with most of our cyber security commentaries Re-reading some articles I wrote years ago, it worries me […]