A CISO’s Job Description: What is a Day in the Life of the CISO?

CISO job description

So, you want to take the next step up the security corporate ladder and become a CISO. Or perhaps your company’s decision leaders are re-considering their approach to cyber security and want to create a CISO position. What is a real, down-to-earth CISO job description? What can a CISO expect an average day to look like? The “average” day will depend on several different factors, according to Dan Lohrmann, former CISO for the State of Michigan and current Chief Strategist and Chief Security Officer at Security Mentor. What the CISO’s job description entails will depend on the size and complexity of the organization, as well as the scope of overall duties. “Some government and business … Read more

Kahua, Inc. Is Leveraging Platform-As-A-Service (PaaS) To Deliver Game-Changing Project Management Results


Trying to keep track of a family of four with two working parents and two teenagers is a weekly conundrum. Who has sports practice? When is the ACT prep class? How many of us are going to the school play? Don’t even get me started on doctor appointments and orthodontic treatments. I’ve tried everything from a datebook called the “Momagenda,” to a spreadsheet we all keep on our iPads, to a giant marker board in the kitchen. But somehow, something always falls off the list or someone forgets a deadline. Now imagine that level of detail for a metropolitan city planning to widen a major freeway system, or a top-tier healthcare corporation needing document management for their hospital expans … Read more

Fine-tuning Network Security

Network Security

By JP Blaho The way workers conduct business is rapidly changing, and as a result, there are new demands on network security. To start, users increasingly are relying on Internet-based software applications to conduct business. Software-as-a-Service (SaaS) use is up, resulting in an 18 percent increase in worldwide revenues from last year to this year. Facebook use more than tripled (in terms of percent of corporate network bandwidth consumed) and Twitter use on company networks grew 700 percent year-to-year from 2010 to 2011, according to one study. And browser-based file-sharing is now found on 92 percent of company networks. Further, there is a blurring between work and personal life. … Read more

Enterprise-level Security at a Small Business Budget

Cloud Security

By JP Blaho As companies embrace the fact that every business is a contender on the Internet, and every company is subject to the same types of vulnerabilities and attacks, they must all realize their network security postures must be advanced and robust.  This means that a company of six employees must have network security protections which mirror those of an organization of 6,000 employees.  As cost-prohibitive as it sounds, there are ways that non-enterprise-level businesses can implement a security strategy that is comprehensive and effective in protecting themselves from attack just as successfully as enterprise customers. One such solution is called Unified Threat Management ( … Read more