Information Security

ChatGPT for Threat Intelligence: Proactive Security with AI

As we progress into an era of increasing cybersecurity threats and expanding digital footprints, the need for effective threat intelligence cannot be overstated. In our previous posts, we’ve explored the vast potential of AI, specifically OpenAI’s GPT-4, in bolstering our information security stance. From crafting policies to assisting with third-party vendor assessments, we’ve seen first-hand …

ChatGPT for Threat Intelligence: Proactive Security with AI Read More »

Vendor Assessment with ChatGPT: Streamline Security with AI

In a previous post, we explored the vast potential of OpenAI’s GPT-4 in the information security space, specifically how it could augment security teams by running third-party vendor assessment with ChatGPT. We now turn the theoretical into practical by sharing our experience of running a vendor security assessment. Building a policy library from scratch can …

Vendor Assessment with ChatGPT: Streamline Security with AI Read More »

The First 90 Days: Navigating Leadership Transitions

Opening ‘The First 90 Days’ by Michael D. Watkins is a powerful guide for any leader stepping into a new role. Whether you’re the one transitioning into a new job or a manager looking to onboard a new hire effectively, the book offers invaluable insights and a robust framework for success. Key Themes and Concepts …

The First 90 Days: Navigating Leadership Transitions Read More »

GPT-4 GRC: Building Information Policies with AI

When it comes to startup operations, one aspect that can often be overlooked in the early stages is the development of a comprehensive and robust policy library. This is especially important when considering information policies, which govern the use, management, and security of data and technology in your organization. Establishing these policies not only sets …

GPT-4 GRC: Building Information Policies with AI Read More »

white laptop on a green meadow

Chromebooks for Enterprise Security: A Comprehensive Guide

When we mention enterprise computers, most of us instantly picture the typical Windows or macOS systems. But in this blog, I aim to challenge the norm and introduce an often-overlooked contender: Chromebooks. ChromeOS’s unique security features combined with a lightweight design make Chromebooks a compelling tool for modern businesses. Let’s delve deeper into why Chromebooks …

Chromebooks for Enterprise Security: A Comprehensive Guide Read More »

excavator, shovel, construction machine-1936799.jpg

CRXcavator: Democratizing Browser Security

Few tools have transformed the landscape of browser extension security as profoundly as CRXcavator. Born out of a simple idea, it has gone on to shape industry practices and empower organizations across sectors with robust security oversight. It all began with a straightforward concept – to design a script that could help security analysts review …

CRXcavator: Democratizing Browser Security Read More »

computer, city, hack-2930704.jpg

Hacking the Gibson, Then and Now: Lessons from “Hackers”

In the 1995 movie “Hackers“, young cyber rebels, portrayed by actors such as Jonny Lee Miller and Angelina Jolie, infiltrate computer systems, outsmart corporate security, and ultimately save the day. The movie, while dated in terms of technology, surprisingly remains relevant when it comes to its depiction of cybersecurity threats. In fact, it seems that …

Hacking the Gibson, Then and Now: Lessons from “Hackers” Read More »

stones, pebbles, stone-4830938.jpg

Leading without authority: Invisible Security

Running a Cyber Security program for your organization is leadership, and often it’s leading without authority.  For your program to run effectively it must: Lead without imposing: Your users should feel like they’re making security decisions because they make sense, not simply because they’ve been mandated to do such, this is especially necessary when you’re leading …

Leading without authority: Invisible Security Read More »