Security leadership philosophy and LinkedIn communication style

Security leadership philosophy and LinkedIn communication style

Reading a LinkedIn post by security professional Tyler Schmoker is like reading an e.e. cummings poem. The Poetry Foundation describes cummings’ work as “spare and precise, employing a few key words eccentrically placed on the page,” grammar and punctuation sprinkled idiosyncratically. Now take that, add some emojis, generous use of the “return” key, lots of ellipses and a breadcrumb-like progression down the page, and you approximate a Schmoker original. Then there’s the subject matter, which…

Read More

Should you write a security book?

Should you write a security book?

In this era of self-publishing, ebooks, gig ghostwriters and publishing on demand, it seems there are maybe 12 people in the security profession who haven’t written a book. Actually, the vast majority of us haven’t. Are we missing an opportunity? Authorship connotes power, authority, confidence, discipline, credibility and mastery — all elements of leadership. Is it time for you to publish a book? There are many factors to consider. You will not make much money,…

Read More

Thou shalt question accepted wisdom

Thou shalt question accepted wisdom

Thou shalt question accepted wisdom | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Giving up the ghost in security job searches

Giving up the ghost in security job searches

Giving up the ghost in security job searches | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Building a cohesive security program starts at the top

Building a cohesive security program starts at the top

Building a cohesive security program starts at the top | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

How to strengthen cybersecurity teams in a high-stress era

How to strengthen cybersecurity teams in a high-stress era

How to strengthen cybersecurity teams in a high-stress era | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Leveraging leadership during a career transition

Leveraging leadership during a career transition

Leveraging leadership during a career transition | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Leadership development programs: Is there one for you?

Leadership development programs: Is there one for you?

Leadership development programs: Is there one for you? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Executive leadership programs for security professionals

Executive leadership programs for security professionals

Executive leadership programs for security professionals | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Utilizing data analytics in physical security

Utilizing data analytics in physical security

Utilizing data analytics in physical security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More
1 2 3