AI’s emergence as a transformative force is spurring CISOs to rethink how their teams operate to harness the technology’s potential and better defend its use across the organization. Excerpt from: […]| J Wolfgang Goerlich
Multi-cloud Security challenges| J Wolfgang Goerlich
From inadequate visibility to access management complexity, multicloud environments take baseline cloud security issues to another level. Excerpt from: 5 multicloud security challenges — and how to address them. Some […] The post Multi-cloud Security challenges appeared first on J Wolfgang Goerlich.| J Wolfgang Goerlich
Don’t click on the link you received about unpaid tolls. It’s likely a scam. Excerpt from: If You Get This Text Message, It’s Probably a Scam. Unpaid toll scams are […] The post Text Message Scams appeared first on J Wolfgang Goerlich.| J Wolfgang Goerlich
“Today we welcome J Wolfgang Goerlich, an advisory CISO, mentor, and strategist. We delve into the intricacies of security design frameworks and the importance of building and maintaining relationships in […] The post Frameworks and Relationships appeared first on J Wolfgang Goerlich.| J Wolfgang Goerlich
Security leaders are expected to defend their organizations against existing and emerging threats. Here are some tactics they can use to crack down on the enemy. Excerpt from: 9 Ways […] The post Ways CISOs Can Stay Ahead appeared first on J Wolfgang Goerlich.| J Wolfgang Goerlich
Security features and encryption, data backup and sync, and more considerations. The post Things to Consider When Buying a Password Manager, U.S. News appeared first on J Wolfgang Goerlich.| J Wolfgang Goerlich
In the 1990s, computers were magic and we were wizards. Want proof? I offer below, Larry Wall’s foreword to Learning Perl from 1993. It greatly inspired a very young me […] The post We were wizards — a foreword to Learning Perl appeared first on J Wolfgang Goerlich.| J Wolfgang Goerlich
Here’s a session I did with John Gunn, CEO of Token, on prioritizing security efforts this year amid changing technologies (hello, AI) and changing regulations (hello, SEC). The post Strategies and Insights for Prioritizing Security Efforts appeared first on J Wolfgang Goerlich.| J Wolfgang Goerlich
Many organizations are interested in using passkeys instead of conventional passwords, but how much better are they? Despite rising concerns about password security and a growing trend towards passkeys and […] The post Passkey Authentication, ITProToday appeared first on J Wolfgang Goerlich.| J Wolfgang Goerlich
With business continuity, CISOs must navigate a complex mix of security, business priorities and operational resilience — often without clear ownership of the process. Excerpt from: How CISOs can balance […]| J Wolfgang Goerlich