Rick Hofstede
Zero Trust: how do I make it concrete?

Zero Trust: how do I make it concrete?

Every year, numerous research and consultancy firms come up with all kinds of overviews of strategic trends in IT and cybersecurity. Invariably, Zero Trust is part of these lists, with definitions along the lines of “don’t just trust anything, but verify”. But how exactly should you go about this as a CIO, CISO, or IT manager?

Security vs. privacy

Security vs. privacy

Security and privacy are two topics hardly mentioned in one breath in daily security operations. On the one hand, this is a good thing because when tactical and strategic thought is given to safeguarding privacy within security, the operation can run freely within those set frameworks.

“Watch your back” or “I’ve got your back”?

“Watch your back” or “I’ve got your back”?

Chief Information Security Officer – sounds great, but is it? It sounds like an amazing position if all goes well… But what if your organization suffers from a large-scale cyber incident? Unlike other C-level positions, things may have personal consequences rather quickly for the CISO, mainly due to the enormous risk and impact of cybersecurity incidents. “You would take care of it, right?” “How could we have been hacked?” “I thought we had a good CISO?!” Unfortunately, judgments are made in split seconds.