Defending Cybersecurity Can’t Be Done Blindfolded–The EU’s NIS2 Review Can Set This Right
More from Executive Perspectives

Closing the Pay Gap: How Pay Parity Continues to Transform Our Workplace
Four years ago, we achieved something that few companies had — pay parity, by compensating all our...Mar 14, 2023 | 3 MIN READ

Three Years of Pay Parity: Lessons in Maintaining Equality
This month, McAfee celebrates three years of maintaining pay parity. Compensating employees equally for their contributions, regardless...Apr 05, 2022 | 4 MIN READ

Time to Batten the Cyber-Hatches
We all like to think we’d know what to do if an emergency should occur. In split seconds,...Jul 09, 2021 | 5 MIN READ

Restricting Supplier Choice Isn’t an Option to Enhance Digital Sovereignty
Digital sovereignty and strategic autonomy are phrases that are used almost daily in EU policy circles, loosely...Jun 23, 2021 | 3 MIN READ

Why Security is Now the Foundation of Good Customer Experience
What does ‘good customer service’ mean to you in 2021? A friendly greeting when you enter a...Jun 16, 2021 | 4 MIN READ

Give CISOs a Shot – They Deserve It
Imagine this scenario: a CEO, CIO, CTO, CISO walk into a bar… The CTO has heard about...May 24, 2021 | 4 MIN READ

Through Your Mind’s Eye: How to Address Biases in Cybersecurity – Part 2
In Part 1 of our Through Your Mind’s Eye series, we explored how our brains don’t give...May 24, 2021 | 9 MIN READ

Through Your Mind’s Eye: What Biases Are Impacting Your Security Posture?
Cybersecurity and biases are not topics typically discussed together. However, we all have biases that shape who...May 19, 2021 | 12 MIN READ

Stupid Is as Stupid Does: XDR Is About the Journey, Not the Destination
Music is lovely, isn’t it? It has the ability to brighten days with upbeat bars or provide...May 03, 2021 | 5 MIN READ

Ransomware Task Force Releases its Comprehensive Framework for Action
Since ransomware’s introduction in 1989 in the form of the AIDS Trojan, also known as PS Cyborg,...Apr 30, 2021 | 3 MIN READ

Trust Nobody, Not Even Yourself: Time to Take Zero Trust Seriously
In the working world, there’s a chance you’ve come across your fair share of team-building exercises and workshops....Apr 21, 2021 | 7 MIN READ

AI Is Alive! But Not Without Our Help
“It’s alive! It’s alive!” Even if you haven’t seen the 1931 film Frankenstein, you are more than...Apr 12, 2021 | 5 MIN READ