Identity & Access Management

London Under Digital Siege, No More Passwords Anymore? Big Ships Upscaling Their Security Responses, Vulnerability Management in the Spotlight, and the Healthcare Security Overhaul. It's Your Wednesday 8th January 2025 Edition of CISO Intelligence!

London Under Digital Siege, No More Passwords Anymore? Big Ships Upscaling Their Security Responses, Vulnerability Management in the Spotlight, and the Healthcare Security Overhaul. It's Your Wednesday 8th January 2025 Edition of CISO Intelligence!

Today’s topics: London's struggling cybersecurity systems, the demise of password management, big hitters needing incident responses on steroids, the metamorphosis of vulnerability management, and healthcare needing its own major cybersecurity surgery. So many topics, so little space!
Read More
The 'Softly Softly' Training Technique, How to Keep the Funds and the Reputation, the Belt and Braces Approach to Block Phishing, Old Adversary: New Games, and Avoiding Digital Minefields. It's the Tuesday 7th January 2025 Edition of CISO Intelligence!

The 'Softly Softly' Training Technique, How to Keep the Funds and the Reputation, the Belt and Braces Approach to Block Phishing, Old Adversary: New Games, and Avoiding Digital Minefields. It's the Tuesday 7th January 2025 Edition of CISO Intelligence!

Today we're looking at the gentle approach to cybersecurity enforcement, keeping the phish out of the pool, the "expecting the worst" default position, the return of ZLoader with a new trick, and walking the digital risk tightrope. Plus a cute picture.
Read More
An Ominous Shakeup, Ticking Boxes or Fully Covering Compliance Requirements,  ASM Vigilance, the Third-Party Minefield, and Phishing with Dragons. It's the Monday 6th January 2025 Edition of CISO Intelligence!

An Ominous Shakeup, Ticking Boxes or Fully Covering Compliance Requirements, ASM Vigilance, the Third-Party Minefield, and Phishing with Dragons. It's the Monday 6th January 2025 Edition of CISO Intelligence!

Today's topics: it's not the earth that's moving, doing what's necessary vs fully understanding and completing the mission, when safeguarding means checking ALL the loopholes, external vendors needing more than a pat down, and doing the hacker two-step. Your Monday warm-up!
Read More

Covering the AI Arc, Spreading the Protection Net, Plugging Data Leaks, Really Knowing Who's Logging In, and Keeping Up with Cloud Certification. It's the Thursday 2nd January 2025 Edition of CISO Intelligence!

Today's topics: the dilemmas of AI regulation, how to cover all of the vulnerability bases, minimising data asset leaks, checking, double-checking and triple-checking login authenticity, and when certifications are not just participation awards. CISO Intelligence, keeping you informed!
Read More

Navigating the IAM Maze, Understanding Jailbreaking vs Rooting, Password Manager Pros and Cons, Rough Retail Seas, and Up-to-Date Phishing. All this in CISO Intelligence, and it's only Wednesday 1st January 2025 !

As the new year breaks, CISO Intelligence looks at getting to grips with IAM, whether jailbreaking and rooting are the same but different, how to manage password managers, retail being a treasure trove for cybercriminals, and phishing in the newest pools. Buckle up, it's going to be a busy year!
Read More