Skip to content

Call +1 (888) 896-7580 for Proactive Cyber Security© Services and Solutions

Category: CXO

As a Chief Security Officer, Chief Information Security Officer, Chief Information Officer, Chief Privacy Officer and career technology practitioner, this category focuses on relevant material and information.

January 23, 2009June 17, 2010 by Michael Peters

Laws of Power – 1

Never outshine the Master: always make those above you feel comfortably superior. If you desire to please or impress them, do not go too far in displaying your talents or you might accomplish the opposite — inspire fear and insecurity. Make your masters appear more brilliant than they are and you will attain the heights… Read More

CXO, Uncategorized
January 23, 2009May 3, 2009 by Michael Peters

Laws of Power – 2

Never put too much trust in friends, learn how to use enemies: Be wary of friends — they will betray you more quickly, for they are easily aroused to envy. They also become spoiled and tyrannical. But hire a former enemy and he will be more loyal friend, because he has more to prove. In… Read More

CXO, Uncategorized

Posts navigation

Newer posts →

Looking for Something?

Recent Updates

  • Using SIEM, SOAR, and GRC Tools for Continuous Monitoring
  • Deviation and Significant Change Requests in FedRAMP: A Comprehensive Guide
  • GRC Platforms and the Key to Resilience
  • The Costs of Compliance and Data Breaches
  • CMMC 2.0 and Level 3 Maturity
  • Security-First Service Architecture for MSPs
  • Automapping ISO 27001 and CMMC Controls
  • Building Resilient Incident Response Coordination for MSPs
  • Third-Party Risk Management and Defense Against AI-Driven Cyber Threats
  • AI GRC and the Evolution of Automation

Site Administration

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org