Mark Akins

Mark Akins

Fractional CISO & CTO | vCISO | Cybersecurity Risk Transformation | Secure Architecture | A-CISO, CISSP, CISA, MCSE

View articles by Mark Akins

Navigating OT Cybersecurity: Practical Insights for Today's CISOs

Navigating OT Cybersecurity: Practical…

February 25, 2025

7 likes2 comments

Navigating the Complexities of Government Audits: A Balanced Perspective

Navigating the Complexities of Government…

February 13, 2025

5 likes1 comment

The Case for Mutual TLS in Non-Human Identities (NHIs)

The Case for Mutual TLS in Non-Human…

January 20, 2025

5 likes3 comments

Securing Azure Cloud Environments: Insights and Strategies for CISOs

Securing Azure Cloud Environments: Insights…

January 14, 2025

11 likes1 comment

How Can Organizations Strategically Address Technical Debt

How Can Organizations Strategically Address…

December 20, 2024

4 likes3 comments

Navigating 2025: A CISO's Guide to Emerging Cybersecurity Challenges

Navigating 2025: A CISO's Guide to Emerging…

December 9, 2024

2 likes

A Comprehensive Approach to Security: Insights on Penetration Testing and Red Teaming

A Comprehensive Approach to Security:…

December 2, 2024

4 likes

Unlocking API Security: A Practical Approach for CISOs

Unlocking API Security: A Practical Approach…

November 21, 2024

4 likes5 comments

Strengthening Supply Chain Risk Management: Lessons and Insights for the Modern CISO

Strengthening Supply Chain Risk Management:…

November 12, 2024

5 likes2 comments

Securing OT/IoT Networks: Strategic Best Practices for CISOs

Securing OT/IoT Networks: Strategic Best…

November 7, 2024

5 likes

When MFA Isn't Good Enough Any Longer: An Urgent Call for Stronger Identity Security

When MFA Isn't Good Enough Any Longer: An…

October 17, 2024

5 likes2 comments

The Cybersecurity Maturity Model: Strengthening Enterprise Security

The Cybersecurity Maturity Model:…

October 15, 2024

4 likes4 comments

Protecting CISOs: Why D&O Insurance is Now a Necessity

Protecting CISOs: Why D&O Insurance is Now a…

October 9, 2024

8 likes

Reevaluating Password Policies: NIST’s Updated Guidelines and the Future of Authentication

Reevaluating Password Policies: NIST’s…

October 1, 2024

3 likes2 comments

Understanding and Mitigating the Growing Threat of Sextortion Scams

Understanding and Mitigating the Growing…

September 5, 2024

3 likes

Protecting Your Kids Online: A Comprehensive Guide for Parents

Protecting Your Kids Online: A Comprehensive…

August 27, 2024

6 likes

Protecting Yourself in the Wake of the National Public Data Breach: Essential Steps and Insights

Protecting Yourself in the Wake of the…

August 26, 2024

3 likes


The Loper Bright Supreme Court Decision: Implications for Cybersecurity Law and Compliance Frameworks

The Loper Bright Supreme Court Decision:…

August 19, 2024

6 likes2 comments

Effective Communication in Leadership: A CISO’s Perspective

Effective Communication in Leadership: A…

August 8, 2024

2 likes2 comments

Mitigating Cyber Threats: Insider Risks and the Role of Security Bypassing Tools

Mitigating Cyber Threats: Insider Risks and…

July 17, 2024

3 likes2 comments

  翻译: