February 26th, 2023 | ๐
https://www.ispeech.org Over the years, security organizations have had to deal with many vulnerabilities that required quick response and remediation. Some
February 26th, 2023 | ๐
iSpeech Anyone who has held the position of CIO or CISO in a government agency or bureau can tell you
February 26th, 2023 | ๐
iSpeech.org In the world of third-party and vendor risk management, many new practices are being adopted. Over the past few
February 23rd, 2023 | ๐
Powered by iSpeech A client for whom I serve as CISO advisor posed an interesting question to me last week,
February 23rd, 2023 | ๐
iSpeech In part 1 of this blog series, I discussed the impact of credential theft on consumers and what they
February 22nd, 2023 | ๐
iSpeech.org Security is hard. Organizations are facing a growing threat, and breaches are becoming commonplace, even happening to companies trying
February 22nd, 2023 | ๐
iSpeech In this blog series I am covering the top 20 Center for Internet Security (CIS) Critical Security Controls (CSC),
February 21st, 2023 | ๐
iSpeech The pace and level of outsourcing has continued to evolve and now includes any and all business areas and
February 21st, 2023 | ๐
iSpeech In this blog series I am covering the top 20 Center for Internet Security (CIS) Critical Security Controls (CSC),
February 21st, 2023 | ๐
TTS Risk management is something to be taken very seriously. Few things are more harmful to a company's reputation and
Gloss