An “Aha!” moment three decades in the making
Artist and philosopher Mitsuo Kakutani told me something that changed my life and business forever–though it only soaked in thirty years later. He said that in our twenties we kick up our heels; in our...
View ArticleWhen IT and Security leaders don’t see eye to eye
Helplessly standing by, I watched as the new CIO dismantled a carefully crafted NIST-compliant security program. Why would he do such a thing? Unplugging the intrusion detection? Tossing out the threat...
View ArticleWhen best intentions are not enough: a business manager’s view of outsourcing...
Security managers try their best. They deploy firewalls and intrusion detection systems like they are supposed to, along with antivirus, web content filtering, encryption and policies. Yet when it...
View ArticleFamed security adviser, Steve Hunt explains, “Why I Hate Security.”
Famed security adviser, Steve Hunt explains, “Why I Hate Security.” These criticisms of cybersecurity and risk management are nothing new. You’ve heard them all before, or muttered them under our...
View ArticleThe NIST CyberSecurity Framework has Never Been So Easy to Follow
Are you finally ready to improve the maturity of your organization’s CyberSecurity program but not sure where to start? The NIST CyberSecurity Framework is an excellent path to success, but it will...
View ArticleFree Tool for Improving Cyber Maturity
This week, the ISSA (ISSA.org) announced a free online tool available to all cyber security professionals. It is being offered as part of its partnership with the Alliance for Performance Excellence,...
View ArticleSix Sad Security Management Flaws You Can Fix Today
Are you one of the lucky few NOT suffering from these six costly management problems? To learn my Four Steps to Security Maturity, and to find out your organization’s Security Success Score™ click...
View Article“Yes, Commissioner. We’ll get right on it.”
Recently I was asked to describe the services of Hunt Business Intelligence. I said, “It’s like picking up the bat phone and getting expert help for any security question or challenge.” That’s a good...
View ArticleSteve Hunt’s Free eBook for Security Managers
When I asked many of you, my peers in IT, if it would be helpful to have a playbook for security management like those used by the best quarterbacks or midfielders or point guards (pick your sport!),...
View ArticleEvery Business Should Join a Peer Group for Cybersecurity
Earlier this year I shared my thoughts with you about the new program for small and mid-sized enterprises from the cybersecurity association (the ISSA.org) making cybersecurity expertise available to...
View Article
More Pages to Explore .....