Feeling vulnerable? Here’s how to build a cybersecurity vulnerability management program!

As businesses grow, so does their attack surface. More network-connected devices drive innovation and efficiency. But with more devices comes more cyber risk.  Protecting the ever-expanding attack surface is more important than ever, with high-profile vulnerabilities being exploited more frequently—and with more impact. 

One of the most effective ways to mitigate cyber risk is by creating and maintaining a robust vulnerability management program.

How to do hyper personalization right

Personalization is good. It makes people feel good about brands that offer it. Good old-fashioned personalization typically uses data points such as name, title, purchase history, zip code and behavioral data to present relevant information.

The most common example of personalization is mass marketing emails that address each customer by name. Another is when a consumer is browsing for a brown jacket and are then shown online ads for brown jackets on other sites.

Hyper personalization takes it up a notch with artificial intelligence and near-real-time data to provide extremely relevant and timely content to customers. 

Using AI, customer behavior and preferences can be finely captured, and that data can be turned into specific messaging delivered at the right time and place for maximum effect.

Here's how to do hyper personalization right.

How the rise in cyberattacks Is changing consumer behavior

If a store you visit often suffers a cyberattack, you might feel like someone went through your wallet. This kind of attack or data breach, and this kind of feeling, isn’t new. The growing frequency, cost and impact of cyberattacks are new — and consumers notice. Consumers are more aware of attacks than ever before. After all, they affect the public directly more often now, such as when attackers steal their personal information from a large company.

Here's how consumer awareness is changing as the result of the rise in cyberattacks. 

Thanksgiving wine!

Every year we drink for Thanksgiving this stunning amber wine called Veto — both made by our wonderful friend, Sara Meneguz, whose winery is in the Prosecco Hills district of Veneto (just north of Venice). The color of Veto is mind-blowing. The taste is indescribable, unlike any other wine I have ever tasted. And it’s the only wine I know of that pairs with all our Thanksgiving foods. I always try, but fail, to capture the color in photographs. But I love the way this Italian wine sparkles in the California sunshine. I’ll keep trying. 

Thanksgiving dishes!

Mac-n-cheese (by popular demand), cranberry sauce (cranberries cooked in orange juice with spices), mushroom green beans, saffron wild rice pilaf, Amira’s mind-blowing salad dressing.

Thanksgiving apple pie!

Fermented whole spelt, white spelt and emmer flour crust. “Nutty bottom” is pecans with kefir drizzle. Apple coated with cinnamon, brown sugar, home-made chai spice mix and corn starch and topped with butter. Egg wash for the top of the crust. 

I miss the goats in Morocco

If you drive around the parts of Morocco where they grow argan trees for argon oil, you'll always find herds of goats that love to climb the trees. They're cute and I miss them. But the good news is that we'll be going back to Morocco in February! 

Why every region of the world has its own cybersecurity problems

Cybersecurity threats, risks and challenges vary a lot from one region to the next and one nation to the next. Targets vary based on local resources to exploit. Cyber criminals and nation-state attackers zero in on specific nations, companies and organizations for varying incentives. 

Of course, the COVID-19 pandemic exacerbated cybersecurity threats. Attackers might launch remote work-enabled attacks or social engineering attacks using COVID-19 fears as the content. The pandemic caused supply chain and economic woes, too. 

Here are the top cybersecurity issues in each corner of the globe today. 

Why you should go hack yourself

Getting breached is the surest way to learn your organization’s cybersecurity vulnerabilities. And that’s why you need to hack yourself before threat actors do. A cyber breach and attack simulation, also called red teaming, is best to understand vulnerabilities in practice, rather than just theory. What can you do before, during and after a simulated attack to boost your defenses?

Wait, what is "proactive cybersecurity," exactly?

Most organizations take what you might call an active approach to cybersecurity, They’re prepared to do certain things once an attack happens. Or, they take a reactive approach, taking action after an attack is completed. A proactive cybersecurity strategy is about acting before any attack occurs; it’s a good cybersecurity posture of readiness.

Take a look at the policies, tools and practices that make up proactive cybersecurity measures.

Witchcraft in the shadow of Monte Alban

Amira and I went hiking with a friend near Monte Alban, which is a fantastic ruin and the site of the Zapotec capital for a thousand years or so. Our friend told us that the whole mountain is used by local witches, who come up at night and perform rituals at specific places. This one, he said, was the site of a fertility ritual. 

Why engineers should study cybersecurity

Engineering and cybersecurity are two distinct disciplines, each demanding its own rigorous education and training. But should there be crossover? Should engineers or engineering students invest in cybersecurity education as well? What are the opportunities for engineers to gain expertise in protecting against threat actors in the software realm?

As the world becomes more complex and the use of cyberattacks grows, the world of cybersecurity benefits more and more from engineering expertise, and vice versa. Here’s why.