Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA)

Two Factor Authentication Did you know that you can prevent 99% of account attacks by using multi-factor authentication (MFA)? MFA also known as two factor authentication is one of the most important security measures you can take. 99.9% of account attacks are...
What is a vCISO?

What is a vCISO?

A virtual chief information security officer (vCISO) is a third-party cybersecurity expert who provides organizations with strategic advice and guidance on information security matters. Typically there are one of three reasons to hire a vCISO: Your company’s...
Crypto Done Right

Crypto Done Right

By Debra Baker CryptoDoneRight is now a nonprofit and has found a home at the Cloud Security Alliance. Ever wonder what cryptographic algorithms to use?  What is better for symmetric encryption, AES-CTR or AES-CBC?  For that matter what is symmetric...
Vulnerabilities #1 Attack Vector

Vulnerabilities #1 Attack Vector

Kaspersky released a 2021 Incident Response report on threats. The latest data it has on initial compromise shows that unpatched vulnerabilities are the number one attack vector. What this means is attackers are exploiting unpatched vulnerabilities on internet-facing...
Welcome to TrustedCISO a vCISO Consulting Company

Welcome to TrustedCISO a vCISO Consulting Company

Hello and welcome to TrustedCISO! I have 30 years of experience in information security. Having been a Chief Information Security Officer (CISO) at RedSeal, Inc, I decided to launch my own vCISO consulting company in 2022. I am experienced in building SOC2 and...