Heather HowlandWhy Users Need to Be Central To Account Takeover Prevention | The Castle BlogSince posting my most recent blog on “ I Am An Account Takeover Victim,” I have had many people respond to me with similar stories. All of…Aug 26, 2019Aug 26, 2019
Heather HowlandI Am An Account Takeover Victim: How This Company Could Have Kept My LoyaltyHow an organization handles an Account Takeover can have a significant impact consumer trust and retention. Recently I became a victim and…Jul 24, 2019Jul 24, 2019
Heather HowlandThree Security Lessons to Keep in Mind Leading Up To the R-CISC SummitIt’s never been more important for retailers to harden their cybersecurity posture — especially given the documented trend of intensified…Sep 28, 2018Sep 28, 2018
Heather Howland3 Ways to Improve Incident Response Time with IATPCompanies today are exposed to many threats and incident response (IR) teams have to respond to both real or suspected breaches. Incidents…Sep 7, 2018Sep 7, 2018
Heather HowlandNo More Paralysis by Analysis: How Security is Evolving to Real-Time OutcomesA well-known CISO customer was recently telling me about his experience with implementing new security solutions. His consistent feeling…Jul 13, 2018Jul 13, 2018
Heather HowlandIt’s 2018. How does Silicon Valley think about a Series B these days?With Silicon Valley continuing to lead the nation in VC funding (source: Bloomberg), expectations are clear: invest that funding and…Jul 5, 2018Jul 5, 2018
Heather HowlandPreempt Is on to Something… In 4 of Gartner Top 10 Security ProjectsAt the recent Gartner Security & Risk Management Summit, analysts presented their findings on the top technologies for information security…Jun 20, 2018Jun 20, 2018