Blog Archive


Working in ad-tech makes me more security aware

Unsurprisingly, leading the marketing group in a company operating in the advertising technology space makes me a better marketer. But, unexpectedly this time, since joining Creatopy I’ve got quite a few security-related insights, especially around the topic of data protection and data privacy. For good reasons, there is a lot of noise about cyber threats, …

Continue reading Working in ad-tech makes me more security aware

The hidden link between Phishing attacks and the American Data Privacy and Protection Act

On how human nature and digital literacy are connecting privacy regulations and phishing attacks. This week I read two seemingly unrelated pieces of news: one was related to the American Data Privacy and Protection Act (ADPPA) being pushed for a vote in the House. The second one was on phishing attacks skyrocketing with top brands …

Continue reading The hidden link between Phishing attacks and the American Data Privacy and Protection Act

A quick outlook into 2022

Top 2022 priorities for most organizations include digitization projects, enhancing hybrid work productivity, public cloud adoption, and increasing cyber-resilience. Ransomware, attacks targeting work-from-home setups, supply chain attacks, and as-a-service cyber-crime will likely dominate the threat landscape in 2022. The transition from cybersecurity to cyber-resilience is accelerating but there are steps to be made for closing …

Continue reading A quick outlook into 2022

My takeaways from last week – Nov 22, 2021

My last week’s readings were a bit peculiar. Most covered personal privacy and life stories connected to cybersecurity. So I decided to focus this post on three privacy-related takeaways from last week. The first is connected to a story from the previous week: the attack on FBI’s email servers and the false warnings sent to …

Continue reading My takeaways from last week – Nov 22, 2021

Five reasons to love being a Product Marketer in Cybersecurity

On quite a few occasions I’ve been asked what it is like to be a Product Marketing Manager in Cybersecurity, particularly at Bitdefender. As with Product Management, Product Marketing has variations from industry to industry and even from company to company. To bring everyone on the same page, I want to mention that in Bitdefender …

Continue reading Five reasons to love being a Product Marketer in Cybersecurity

My takeaways from last week – Sept 27, 2021

Each Monday I’m publishing a list of quick thoughts and top readings on cybersecurity from the previous week. Here is my take from the week of September 20th: An excellent article on advanced phishing: Hackers Are Going ‘Deep-Sea Phishing,’ So What Can You Do About It? “Hackers are upping their game, using an approach I …

Continue reading My takeaways from last week – Sept 27, 2021

How ransomware changed the face of cybersecurity

In a popularity contest for cyberattacks, Ransomware would definitely win and its (bad) reputation among the general public is well deserved. Ransomware is probably the type of attack that had the most significant influence on the cybersecurity industry in the last 10 years. Here is why. The Prevalence Compared to other classes of attacks – …

Continue reading How ransomware changed the face of cybersecurity

Security Architecture considerations for Cyber Resilience – why threat prevention is important

In an earlier blog this year, I compared the concepts of cybersecurity and cyber-resiliency, arguing that the main difference between the two is one of perspective. Cybersecurity is centered on the idea that attacks can (and should) be prevented while cyber-resilience acknowledges that some attacks will go through, and that organizations must prepare to deal …

Continue reading Security Architecture considerations for Cyber Resilience – why threat prevention is important

A Practical Approach to Cyber Resilience – Developing solutions (Part 3 of 3)

In the third and last part of the blog series on Practical Cyber Resilience, I will cover the Approaches, Tactics and Techniques that an organization should use when developing options for improving cyber resilience. In the previous blog, I detailed the practical five-step Cyber Resilience Analysis Process recommended both by NIST and MITRE for enhancing …

Continue reading A Practical Approach to Cyber Resilience – Developing solutions (Part 3 of 3)

A Practical Approach to Cyber Resilience – The five-step process (Part 2 of 3)

This is the second of a 3-blog series on Practical Cyber Resilience. In the first part, I covered the four key characteristics (or guiding principles) of cyber resilience. In this blog we will review the main objectives and 5-step Cyber Resilience Analysis methodology, as defined by the NIST Special Publication 800-160, Developing Cyber Resilient Systems. Within …

Continue reading A Practical Approach to Cyber Resilience – The five-step process (Part 2 of 3)

Three takeaways for a Small Business from the Microsoft Exchange hack

I heard this so many times: “My company is too small to be the target of an advanced attack”. Unfortunately, this is not true and the recent cyber-attacks on Microsoft Exchange servers clearly show it. Compared to the recent SolarWinds Orion security breach that directly affected mostly large organizations, the Exchange vulnerabilities were used to …

Continue reading Three takeaways for a Small Business from the Microsoft Exchange hack

A Practical Approach to Cyber Resilience – Part 1 of a 3 Part Series

In a previous blog, I looked at the key differences between cybersecurity and cyber-resilience, and why cyber-resilience is a better approach for organizations to follow in 2021 because it is holistic. The IT cyber-resilience is a complex objective requiring a solid understanding and a structured approach. NIST Special Publication 800-160, Developing Cyber Resilient Systems, is one …

Continue reading A Practical Approach to Cyber Resilience – Part 1 of a 3 Part Series

Cybersecurity or Cyber-resilience: Which one should be the prime objective for 2021?

Given the increased dependency on digital technologies for daily operations it’s not a surprise that organizations are concerned about cyber threats and the risks these are posing to their operations. But what is the best approach to this problem? Should an organization focus on cybersecurity or on cyber-resilience? Which of the two can be consider …

Continue reading Cybersecurity or Cyber-resilience: Which one should be the prime objective for 2021?

Five defining moments that shaped cybersecurity in 2020

Among the many disruptions brought by 2020, cyber threats ranked in the top concerns. As we had to rely more on digital for work and social life, cyber-attacks became very real threats for most aspects of our lives: health, work, freedom, national security, and even life itself.  Here is a selection of 5 defining moments …

Continue reading Five defining moments that shaped cybersecurity in 2020

Defeating supply chain attacks together

The recent security incident involving Solarwinds Orion proves that cybersecurity is a team game. We all use software developed by a wide range of providers (and we will continue to do so). Any successful attack on one of these vendors (suppliers) can have negative consequences on all users of their software solutions. Solarwinds was targeted …

Continue reading Defeating supply chain attacks together

My IRONMAN 140.6

“You are an IRONMAN!” These four words go through your ears and directly to your heart! It is hard to explain the feelings you have while running on the red carpet the last 20 meters of a 140.6 miles race and hearing for the first time the famous words: “You are an IRONMAN”. I can’t …

Continue reading My IRONMAN 140.6

Grown-up games

Playing is an essential activity for human development. By playing children develop skills from the simplest to very complex ones. But the role of playing is not limited to childhood, on the contrary, it transitions to adult life and it continues to be part of human life until the end. I dare to say that …

Continue reading Grown-up games

The Effective Executive, by Peter Drucker – Book Review

About the Author Born in Austria in 1909, Peter Drucker is one of the most influential business writers of the 20th century. He taught management beginning with 1950 until 2005 (when he died) at New York University and Claremont Graduate University. He wrote more than 30 books on business and management, most of them translated …

Continue reading The Effective Executive, by Peter Drucker – Book Review

Pen and paper

I do not know how many of you are familiar with the phrase “Death by PowePoint”. In a few words, it’s the terrible boredom that the audience of a slides based presentation must endure most of the times. As my brother said one day, many presentations have the “Point” but are lacking the “Power”. Not …

Continue reading Pen and paper