How to build an effective security team

How to build an effective security team

Acquiring the right assets is essential to developing a proper security posture. There are many assets that could benefit an organization, but there is one asset in particular that is of great priority and value across the board: the security team. An efficient security team is a key pillar to any organization’s security posture. As exciting as the newest security technology may be, it is only as effective as the team that deploys it. By constructing…

Read More

Leadership lessons at the movies

Leadership lessons at the movies

In 2011, Dave Logan, John King and Halee Fischer-Wright introduced “tribal leadership,” in which members of an organization cluster together based on shared beliefs and outlooks. So while the security, marketing and operations departments may have their unique cultures, employees will naturally gravitate toward like-minded people beyond their division. Each tribe — which may contain 20 to 150 people — occupies a specific stage, according to this theory. Stage 1 tribes believe “Life sucks, and…

Read More

Absolutely the most important list you will ever read!

Absolutely the most important list you will ever read!

Say this, not that. Read that, not this. Do this, not that. You too can become a great leader if you simply follow the exhortations of leadership lists that can be found all over the Internet.  Which phrases should good leaders never say? Dozens of articles purport to document the five, eight, 12, or 17 no-nos. Conversely, great leaders may exhibit their very greatness by injecting key incantations in their communications with staff. The Internet is rife…

Read More

Building a cohesive security program starts at the top

Building a cohesive security program starts at the top

Building a cohesive security program starts at the top | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Think like a cybercriminal: How to strengthen your organization’s security posture

Think like a cybercriminal: How to strengthen your organization’s security posture

Think like a cybercriminal: How to strengthen your organization’s security posture | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More