The Discernible Blog

Why No One Listens to Cassandra
Melanie Ensign Melanie Ensign

Why No One Listens to Cassandra

The widely misunderstood curse of Cassandra didn’t impact other people’s ability to understand each other. It changed how Cassandra communicated, burying the meaning of her advice in vague and opaque language.

Read More
CUSTOMER CASE STUDY
Melanie Ensign Melanie Ensign

CUSTOMER CASE STUDY

Discernible was brought in by Twilio’s then CISO to find a creative and easily deployable solution to entice people from across the security organization to speak, blog, and generally share the good work the teams were doing and engage more deeply with their cohort outside the company.

Read More
How Security Communications Gives Recruiting an Edge 
Melanie Ensign Melanie Ensign

How Security Communications Gives Recruiting an Edge 

Lauren Bryant has worked as a senior technical recruiter at Uber, Paypal, Lime, and more. Here, she discusses the critical relationship between recruiting and communications teams when it comes to hiring the best and brightest in cybersecurity and technology today.

Read More
Communication Measurement and AI
Melanie Ensign Melanie Ensign

Communication Measurement and AI

There is a lot of promise for AI in making it easier and more cost-effective for organizations to adopt an outcomes-based approach to measurement instead of merely counting outputs. Imagine, for example, that we could use AI to quickly and more expansively track the impact of the specific content, language, and timing of incident response communications.

Read More
CUSTOMER CASE STUDY
Melanie Ensign Melanie Ensign

CUSTOMER CASE STUDY

“I noticed that Melanie has a rare ability to speak in headlines and get right to the point in a compelling way… I wanted to learn how to do that.”

Read More
Communication Research Takes on the Myths of Privacy Compliance
Melanie Ensign Melanie Ensign

Communication Research Takes on the Myths of Privacy Compliance

We can’t build trust without understanding and if people don’t understand how their data is used, the rights they have, and how to exercise them then all our efforts to build trust in our privacy programs are for naught. To do this, we need to measure the effectiveness of our communications, including the channels, language, and visuals we use – so that we can adjust as needed to ensure the people whose data we’re using never feel duped into sharing it.

Read More
CUSTOMER CASE STUDY
Melanie Ensign Melanie Ensign

CUSTOMER CASE STUDY

The hallmark of Discernible’s approach is that incident response plans are designed to address a variety of security-related incidents regardless of severity or impact.

Read More
A CISO’s Guide to “Negative Megaphoning”
Melanie Ensign Melanie Ensign

A CISO’s Guide to “Negative Megaphoning”

Negative megaphoning can have a significant impact on the reputation of your company as well as specific teams, like infosec. It may seem obvious that organizations want to minimize negative news headlines, but how often do CISOs think about their reputation as an employer and how that affects their ability to hire and retain talent?

Read More