Content
Strategic insights on blockchain, AI, and leadership in disruption.
blockchain Posts
306 posts
#10: Murray Rosenthal
Explore the intriguing journey of Murray Rosenthal, a history major turned security architect for Toronto, in Episode 10 of the Building a Life and Career in Security Podcast. Discover insights on smart cities, public vs. private sector challenges, and the evolving landscape of information security
#8: Jake Bernier
Discover the dynamic journey of Jake Bernier, from hacking video games to teaching information security. Learn how networking and passion propelled his career in Episode 8 of the Building a Life and Career in Security Podcast.
#7: Adam Shnider
Explore Adam Shnider's journey from consultant to CISO, his cross-country move, and balancing work travel in episode 7 of the Building a Life and Career in Security Podcast with Jay Schulman.
On Third Party Security Breaches
Explore the aftermath of the T-Mobile/Experian breach, examining blame dynamics, brand impact, and strategies for mitigating third-party risk. Learn how to protect your company from similar incidents.
#4: Aby Rao
Join Aby Rao, Director of Identity and Access Management Technology, as he shares his journey from UI Designer to security leader, offering insights on career transitions, certifications, and work-life balance.
#3: Caroline Wong
Explore Caroline Wong's journey in the security industry, as she discusses writing her influential book, finding mentorship, and balancing life as a working mom. Gain insights into her career path and the challenges and triumphs she faced along the way.
Get Engaged In Local Security Groups
Discover how to strengthen your local security network by engaging with organizations like OWASP, ISACA, ISSA, and more. Enhance your career through local meetups and conferences.
Security Longreads for August 7, 2015
Explore the latest in information security with Security Longreads, featuring highlights from Black Hat 2015, FBI's TrueCrypt decryption, and Tesla's quick security patch. Discover engaging reads beyond security too!
The Only Security Certifications You Actually Need
Discover which security certifications truly boost your job prospects. Focused on employer demand, this guide highlights the essential CISSP and CISA for security and audit roles.
An Argument for the Decentralization of Security
Explore why decentralizing security in corporate mergers can reduce risks. This blog delves into maintaining separate networks, security teams, and PCI environments to minimize vulnerabilities.
Security Longreads for July 24, 2015
Dive into July 24, 2015's Security Longreads, featuring in-depth insights on cryptographic backdoors, Jeep hacking, overhyped cyber threats, and Twitter's security strategies, plus other intriguing topics.
Security Longreads for July 10th, 2015
Explore the week's top security stories, including government encryption access issues and a hacking firm's breach. Dive into Symantec's insights on hacker motives and the Mob's tech use, plus a sales analysis.