Endpoint Management, the Blind Men and the Elephant[1]

Endpoint Management, the Blind Men and the Elephant Author: Christopher Hodson The parable of the blind men and the elephant is thousands of years old and has several well-known variations. It goes more or less like this: a group of blind men that have never encountered an elephant before come across an elephant and begin to …

Continue reading Endpoint Management, the Blind Men and the Elephant[1]

Top Tips For Improving Endpoint Visibility And Control In 2020

By Chris Hodson January 10, 2020 In 2019 we saw a steady increase in the number and modes of cyberattacks. In fact, more than half of all British companies reported cyberattacks in the last year alone. To prepare for  2020, Tanium looked into the biggest concerns for IT decision makers within organisations in the UK. This revealed that …

Continue reading Top Tips For Improving Endpoint Visibility And Control In 2020

Why IT Security Hygiene is so Crucial for Financial Services Firms

The UK financial services sector is going from strength to strength, and even during a period characterized by political uncertainty, it still enjoys a dominant position on the European stage. In certain corners of the financial services market, such as the burgeoning fintech sector, business is booming as fintech firms embrace digital technologies that materially improve …

Continue reading Why IT Security Hygiene is so Crucial for Financial Services Firms

What We Really Mean By “Digital Transformation”

Exec Blog 10.24.2019 Christopher Hodson In his role as CISO, Christopher Hodson frequently meets with CIOs, CTOs and CISOs who are tasked with supporting enterprise-scale technology refactoring initiatives, often without the prerequisites necessary to ensure that information protection and business resilience are retained. This blog is 1 of 3 in a series examining digital transformation in …

Continue reading What We Really Mean By “Digital Transformation”

Ops and Cybersecurity.

Chris Hodson, EMEA CISO at Tanium: “An organisation’s reputation is increasingly contingent on maintaining a robust approach to cybersecurity and IT operations. This has been illustrated over the last few years by a number of high-profile breaches that have, in turn, led to ongoing reputational issues or loss in consumer trust for some organisations. “Over the …

Continue reading Ops and Cybersecurity.

Building a Risk-Based Cybersecurity Architecture

I have recently joined the Cybrary Mentorship Program. I have really enjoyed my time thus far, providing students across the globe with a few insights from my time in the field working as a CISO, architect, designer, and systems engineer. I am helping the guys at Cybrary with their CISO-based syllabus and recently participated in …

Continue reading Building a Risk-Based Cybersecurity Architecture

It’s not if it’s when you’ll be compromised.

Another cyber truism presents itself with the statements that ‘it is not if you’ll be compromised it’s when’.  Another, very similar statement being ‘there are two types of organisations: those who have been breached, and those who don’t yet know they’ve been breached’. The sentiment behind this message is solid.  It reflects the fact that …

Continue reading It’s not if it’s when you’ll be compromised.

Best of breed is best…apparently!

Another cyber-truism is that ‘best of breed’ controls are best.  A variation of this statements exists in the EU’s General Data Protection Regulation (GDPR) which refers to ‘state of the art’ controls (EUR-LEX, 2016).  A challenge with best of breed is that companies select technologies based on the industry’s opinion of a particular solution.  Control …

Continue reading Best of breed is best…apparently!