Posts by Christian Ulmer

Identifying and Addressing Post-Quantum Risks

Growing Risks from Quantum Attacks In addition to the active Harvest Now, Decrypt Later (HNDL) threats we already face today, further risks are coming into sharper focus:[…]

Zero Trust & Risk Management: Trust is (Not) a Strategy

In the digital world, systems, applications, and users often rely on implicit trust: devices are considered secure because they are managed or part of the[…]

Beyond All-Stars: How Cohesion and Purpose Drive Security Team Success

Legendary Basketball coach Phil Jackson one said, “The strength of the team is each individual member. The strength of each member is the team.”   Jackson[…]

CISOs and the Board: Why it matters more than ever

Following up on our post about security strategy, we’re going to take a focus on executive communication. Security leaders frequently encounter advice on how to present[…]

Navigating Change: Current Trends and Challenges for Security Operations Centers

In the fast-paced world of cybersecurity, Security Operations Centers (SOCs) are at the forefront of defending businesses from an ever-growing threat landscape and stringent regulatory[…]

Elevating Your Third-Party Management with SSPM

In our exploration of SaaS Security, we’ve covered Cloud Security capabilities, unveiled the transformative potential of SSPM for enhancing SaaS Security, and provided insights on initiating a[…]

Empowering SaaS Security: Insights for SSPM Implementation and Optimization

The second post in our SaaS Security series explores launching your program for comprehensive data and resource protection across your SaaS ecosystem. If you missed[…]

Shadow IT Goes Cloud: Securing the SaaS Landscape

Introduction Initiating our series on SaaS security, this post delves into the evolution from traditional on-premises solutions to cloud services, emphasizing the ease of SaaS procurement[…]

A No-Frills Guide to Crafting an Actionable Cyber Security Strategy for Small & Medium Businesses

Embrace the Practical: Why Tangible Beats Perfection Every Time Cyber security strategy design and presentation often tip into overwhelm. For creators, the temptation is to[…]

en_GBEnglish