Guest Post: Setting the Stage – Security in the Business

Within Security Operations Centers (SOCs), and throughout IT security departments, people and tools rule supreme. Cybersecurity management within most organizations is dictated by spending on human resources and technology, with little to no emphasis on Return on Investment (ROI) analysis, and little to no proof-of-value analysis on the myriad of security products in use. &n [...]

Keep Reading

When Quantifying Cyber Risk, Make it Real and Tangible

Don’t have time to read? Start listening to this blog post now: Nehemiah Security partnered with MightyGuides to interview seven industry experts with the mission of advancing the risk management conversation among cyber professionals. Each interviewee was posed the question, “If your friend was put in charge of measuring cyber risk at their company, what advice woul [...]

Keep Reading

Guest Post: Solving the Security Risk Puzzle, A Brief History

Don’t have time to read? Start listening to this blog post now: As a 20+ year security, compliance, and risk veteran, I am surprised that no one has solved the security risk puzzle yet.  Trust me, I’ve tried, and so have others.  But, here we are in 2018, still talking about the same issues with a new slant… The European Union’s General Data Protection Regul [...]

Keep Reading