Posts By Jana Korfhagen

Five critical cybersecurity vulnerabilities revealed in pen testing

Watch video: Top 5 Cybersecurity vulnerabilities uncovered: OnX Penetration Testing Countdown of vulnerabilities discovered in pen testing Number 5: Absence of security headers for applications One frequent vulnerability found in web application pen testing is the absence of security headers. Headers like HTTP Strict Transport Security (HSTS) enforce secure connections, and other headers can help […]

Remote working security risks: Safeguarding today’s workspace

What is zero trust? Zero trust is a security benchmark based on the idea that every connection is inherently suspicious until it has undergone authentication, limitation, and habitual verification. Combining zero-trust principles with the latest cybersecurity measures and toolkits is the best practice for safeguarding the IT environments of modern businesses. Zero-trust principles are successful […]

Enhanced cybersecurity services: Partnering with a managed security service provider

End the vicious circle of security fatigue with third-party-supported cybersecurity services. Managing the totality of an organization’s cybersecurity services makes cybersecurity fatigue a fact of life for today’s IT professionals. Remote and hybrid work has brought about greater reliance on cloud services. Consequently, safeguarding digital assets now comes with additional layers of complexity. An abundance […]

Integrating AI and cybersecurity: Emerging threats and strategies

Watch now: The impact of AI on Cybersecurity: Top concerns for CISOs Advancing security: The power of AI and cybersecurity Artificial intelligence (AI) is transforming the field of cybersecurity and elevating standard security protocols with its advanced functionalities: Ryan Hamrick, CBTS security consulting services manager, underscores the transformative impact of AI on cybersecurity: “Artificial intelligence […]

Securing funding to prioritize cybersecurity risk management strategy

On this episode of Inside the CISO’S Office, vCISO John Bruggeman converses with Allan Hackney and Jim Studer, each a current consultant and former CIO of several large corporations, including GE, Bank of America, and Univision. They discuss the landscape of legal risk and regulatory compliance surrounding cybersecurity, and how to effectively communicate these pressures […]

On the CISO path: Galvanizing female tech professionals and improving cybersecurity in aviation

The cybersecurity battleground Cybersecurity continues to move forward, and the attack surface grows as it does. Taking control of the full scope of risks and threats will be daunting for the most experienced security staff. Deneen pointed out that for all the headway made in cybersecurity in aviation, security professionals still manage comprehensive systems, networks, […]

New threats demand a change in approach to cyber risk management

John Bruggeman, Consulting CISO at OnX connects with virtual CISO Tom Siu of Inversion6 in this episode of Inside the CISO’S Office. We tackled how CISOs can support cyber risk management initiatives within their organizations and the adjustments required to stay ahead of ever-evolving cyber threats. We also covered rubrics for recognizing and ranking cyber […]