Sitemap - 2025 - SMB Tech & Cybersecurity Leadership Newsletter

Your Cybersecurity Career Blueprint: Expert Advice from Motti Tal

Beyond the Bank Account: Phishing as a Tool for Espionage

Navigating the Future of Cybersecurity: Insights from William (Bill) Welser IV

Cybersecurity Entrepreneurship: Real-World Advice from Serial Founder Sinan Eren

How to Build a Security Culture with Data-Driven Reporting

Vulnerability Management Metrics: 15 KPIs to Measure & Mature Your Program

Perk of being a paid subscriber, a chat discuss challenges and opportunities!

The Ghost in Your Cloud: How Hackers Use Social Engineering to Infiltrate and Attack

Data-Centric Security: Protect Your Cloud Data with Microsoft Defender

The Phantom Workforce: A Guide to Combating State-Sponsored IT Infiltration

Develop and Enforce Robust Remediation Policies and SLAs

From Psychology to Cybersecurity: Craig Taylor's Impact

Navigating the Cybersecurity Career Path: Insights from CISO Tradecraft with Guest Christophe Foulon

Embed Security into the DevOps Lifecycle (DevSecOps)

CISO Trade Craft Podcast with Guest Christophe Foulon

TRaViS: See Your Company Through an Attacker’s Eyes—Before They Do

Automate Remediation and Response with Security Orchestration

Cloud Security: Identity as the New Perimeter | JIT & Adaptive Access

Overwhelmed by Alerts? A Guide to Risk-Based Prioritization Over CVS

10 Best Practices for the Modern Enterprise: Achieve Complete Attack Surface Visibility

Personality of AI Security Agents

Improving Your Cloud Security Posture with Vulnerability Remediation

AI-Powered Phishing: The Top Threat for SMBs in 2025 – and How to Fight Back

Your 'Secure' Data Isn't Safe. Here's Why.

Strengthening Your Digital Defense: Practical Cybersecurity Approaches for SMB Tech Executives in 2025

Implementing Zero Trust Security for Small and Medium Businesses with Microsoft Solutions

Review of the 2025 Verizon DBIR

Navigating CMMC 2.0: A Strategic Imperative for Tech Leaders Protecting CUI

Crafting an Effective Overall Risk Management Plan for SMBs from Scratch

Navigating NIST 800-171 Compliance: A Strategic Guide for SMBs

Combating Security Platform Fatigue: A Strategic Approach to Tool Consolidation

Building a Robust Data Governance Strategy for SMBs

Safely Implementing AI for SMBs

Implementing Zero Trust Security for Small and Medium Businesses with Microsoft Solutions

Poll

Getting your SMB ready for AI use safely

AI-Powered Gamification: Revolutionizing Cybersecurity Training for SMBs

Proposed 2025 HIPAA Security Rule Changes & SMB Implications

Connecting DHCP Data Sources to Microsoft Sentinel, Querying with KQL, and Creating Custom Dashboards

Getting Started with Microsoft Compliance Manager

The Importance of Data Security Posture Management for SMB Leaders

A Deep Dive into Modernizing SMB Security

Stepping into Zero Trust with a Solid Strategy

Azure Security Best Practices for Small to Medium-Sized Businesses

The Identity and Data Management Challenge for SMBs: Navigating the Digital Landscape

Preparing Your Data Governance Journey for AI

Building Cybersecurity Culture: Engage Employees & Mitigate Risk

Essential Cybersecurity Policies for SMBs: A Blueprint for Protection and Growth

Top 5 Cybersecurity Challenges for Small Businesses