Claude Code Security Announcement Ruffles Investors

On Friday, Investing.com reported that shares of cybersecurity software companies tumbled after Anthropic introduced Claude Code Security. CrowdStrike was among the biggest decliners, falling 8%, while Cloudflare slumped 8.1%. Zscaler dropped 5.5%, SailPoint shed 9.4%, and Okta declined 9.2%. The Global X Cybersecurity ETF fell 4.9% and closed at its lowest since November 2023. What Is Claude Code Security? Claude…

Read MoreClaude Code Security Announcement Ruffles Investors

Does “Open to Work” Really Mean “Open to Being Scammed?”

I started seeking the next step in my career a few weeks ago. I first updated my resume and set my LinkedIn profile to “Open to Work” for recruiters and hiring teams to see my status. I also put a post indicating that I was “Open to Work” outlining what I am seeking. Within minutes, I was contacted by two…

Read MoreDoes “Open to Work” Really Mean “Open to Being Scammed?”

Policies, Procedures, and Standards – Why They Are Needed and Their Impact on Corporate Security

People by nature don’t like to be told what to do. Most people would rather be told what needs to be done and left to their own devices to produce the end result. That approach works fine if you are an organization of one. Bring in another person and suddenly things start to get done differently by each person. Those…

Read MorePolicies, Procedures, and Standards – Why They Are Needed and Their Impact on Corporate Security

Security Faux Pas – Owning Up When You Make A Mistake

A company can have the best security controls in place, have a staff that is highly security-aware and have what they consider outstanding security practices in place and yet bad things can and do happen. Many times, security breaches are caused by malicious actors exploiting some unnoticed vulnerability in a running service or other infrastructure. These breaches happen without involving…

Read MoreSecurity Faux Pas – Owning Up When You Make A Mistake

Understanding the Value of a SOC 2 Report (Service Organization Controls)

A recent post by Kendra Cooley led to a lively discussion around the value of SOC2 attestations. She followed this up with an article that goes into a bit more depth. Discussion around these sorts of issues is always educational. The devil is in the details. When one discusses SOC without clarifying the details, the waters get muddy very fast.…

Read MoreUnderstanding the Value of a SOC 2 Report (Service Organization Controls)

Importance of Separating Corporate and Personal Identities and Devices

In 2013, malicious actors stole 40 million credit card numbers and the personal details from 70 million customers in what has become known as the Target data breach. For those of you that don’t know, Target is a very large retail chain with locations around the world. In addition to credit card numbers, the cybercriminals also got away with PINs,…

Read MoreImportance of Separating Corporate and Personal Identities and Devices

Importance of Asset Management in Organizational Security

Organizations must take risks in order to operate. Each organization determines what level of risk is acceptable to that organization. This concept is known as risk appetite. Security is the process of examining risk across an organization and taking defined steps to reduce those risks to a level that is acceptable to the organization. Security is NOT the act of…

Read MoreImportance of Asset Management in Organizational Security

The Importance of Personal & Corporate Cybersecurity Hygiene

We care for our bodies. We eat. sleep, bathe, brush our teeth, wash our clothes, clean our homes and see doctors as needed in order to keep ourselves healthy. This concept of self-care we call personal hygiene. We practice personal hygiene throughout our lives in hopes of having a long and healthy life. Many of us have pets that bring…

Read MoreThe Importance of Personal & Corporate Cybersecurity Hygiene

Proper Password Management

Possibly one of the most poorly understood and overlooked problems faced by businesses and consumers is the proper implementation and management of passwords. Typically, access is granted to a system or resource simply by entering a username and password. Usernames are typically email addresses or some combination of the user’s first and last name, so these are easy to guess.…

Read MoreProper Password Management