top of page
Search
Feb 13, 20214 min read
Research Challenges in Info/Cybersecurity - Part 2: “Carbon”
This is the second part of the post from 2 weeks ago, which explored research challenges in Info/Cybersecurity related to systems:...
837 views
Jan 30, 20215 min read
Research Challenges in Info/Cybersecurity - Part 1: “Silicon"
This is the first of a two part post on research challenges centered on systems, computer science and engineering research challenges....
1,002 views
Jan 17, 20213 min read
Situational Drivers of Cyber-Risk
Many years ago I wrote down a list of the drivers that create information / cyber-risk or that otherwise compel the need to mitigate this...
2,083 views
Dec 19, 20205 min read
Privilege Management Program - Governance
I can’t recall having seen an overview of a systematized privilege management program. There are lots of great articles on specific...
2,348 views
Dec 13, 20208 min read
Security Ratings: Love, Loathe or Live With Them?
Security ratings services tend to be loved or loathed. Loved if you consume them and it makes your job easier, especially if you have no...
4,159 views
Dec 6, 20206 min read
The Seat at the Table: Integrating Security into your Business
The success of a security program is largely determined by how well it is integrated into the fabric of the organization, in terms of...
2,058 views
Nov 29, 20203 min read
Simple Rules of (InfoSec) Career Success - Updated
Over the years I've noted the behaviors I’ve seen from consistently successful people. In this context I define success as a balance of...
1,646 views
Nov 22, 20205 min read
Scenario Planning - The Best Technique You Might Not Be Using
Scenario planning is one of the most underutilized techniques in security. Which is surprising given how effective it is in [good]...
2,639 views
Nov 8, 20204 min read
Principles for Cybersecurity Metrics
“For every metric, there should be another ‘paired’ metric that addresses adverse consequences of the first metric.” - Andy Grove We talk...
3,897 views
Nov 1, 20207 min read
The Uncanny Valley of Security (or Why We Might Never Finish Anything)
The uncanny value is a famous term in robotics. It is used to describe how we accept robots that don’t attempt to look too human, but,...
3,063 views
Oct 25, 20204 min read
Cybersecurity Macro Themes for the 2020’s - Updated
There will be 6 major themes that differentiate great security programs, products, features and processes. These are different from...
1,796 views
Oct 18, 20203 min read
Why Cybersecurity Budget Benchmarks are a Waste of Time
I have built up a disdain for cybersecurity budgeting benchmarks. To be fair, there are some good attempts amid a sea of haphazard...
2,703 views
Oct 13, 20202 min read
Vulnerability Management - Updated
It still surprises me that much of the tone of vulnerability management is about patch/bug fix vs. detecting broader configuration and...
2,245 views
Oct 4, 20204 min read
Security for More than Security’s Sake - The Need for Adjacent Benefits
Truly excellent security programs deliver more than security risk mitigation. I know it is kind of ridiculous to say that when doing the...
1,254 views
Sep 27, 20205 min read
The Most Important Mental Models for CISOs - Simple Steps for Outsize Effects
There are lots of problem solving techniques across many fields. These are often represented as mental models or behavioral short-cuts....
2,270 views
Sep 20, 20203 min read
The Rising Tide and the Case for Security Optimism
Continuing with the theme of raising the baseline by reducing the cost of control we can see the next logical progression is that the...
856 views
Sep 13, 20204 min read
Raise the Baseline by Reducing the Cost of Control
One of the most successful techniques for enterprise security in many organizations is to create a universal baseline of controls that...
1,661 views
Sep 6, 20203 min read
Taking Inventories to the Next Level - Reconciliation and Triangulation
We know it is important to have good inventories across all of the assets we care about in an enterprise. For security purposes this is,...
1,256 views
Aug 22, 20203 min read
Cybersecurity Workforce Development - Updated
It is still somewhat frustrating that most of the dialog about the skills shortage in cybersecurity focuses, perhaps inevitably, on the...
1,221 views
Aug 8, 20203 min read
Insider Threat - Blast Radius Perspective - Updated
Of the vast canon of insightful commentary that has come from Dan Geer over many years, one that especially stuck with me was his...
1,267 views
bottom of page