Cybersecurity is Like Securing Your Car

Cybersecurity is Like Securing Your Car

Cybersecurity is Like Securing Your Car Executive Summary: How many of the things in this illustration do you do to secure your car?  This approach is called “Defense in depth”. It originally comes from military strategy and it is also the foundation of every good...
Leverage Cybersecurity Spending

Leverage Cybersecurity Spending

Leverage Cybersecurity Spending Executive Summary A diamond only shines to the extent that it’s in the right setting. Getting full leverage from your cybersecurity spending works on the same principle. The optimal setting for cyber technology requires adapting...
The Cybersecurity Business Case for Manufacturing Supply Chain

The Cybersecurity Business Case for Manufacturing Supply Chain

The Cybersecurity Business Case for Manufacturing Supply Chain Executive Summary: Research shows that the manufacturing supply chain is a tinderbox for cybercrime. The good news is that there’s significant leverage from investment in basic security fundamentals.  An...
Configuration Assurance – Naming the Elephant

Configuration Assurance – Naming the Elephant

Configuration Assurance – Naming the Elephant Executive Summary: This is the story of a dilemma solved. A Chief Information Security Officer (CISO) had time and again discovered problems with patching and configuration settings not matching agreed upon standards. It...
How to make your data classification project easier

How to make your data classification project easier

How to make your data classification project easier Executive Summary Based on business transformation experience with several projects, the SecuriThink Data Classification Complexity Scale reflects some of our lessons learned in the field. It is offered to better...