top of page
Search
Good CISO / Bad CISO
In a first for this blog here is a post I worked on with Mike Aiello , a former colleague from Goldman Sachs and Google and someone, like...
Sep 205 min read
Â
Â
Metaphors Matter: Cyber War vs. Cyber Hygiene
Cybersecurity is a field built on metaphor. We wage "cyber wars," build "digital fortresses," and practice "cyber hygiene." These phrases...
Sep 64 min read
Â
Â
Everyone Has A Plan Until They Get Punched In The Face
Apparently what Mike Tyson actually said in a 1987 interview was, " Everybody has plans until they get hit for the first time". In any...
Aug 237 min read
Â
Â
Security and The 7 Deadly Sins
I re-stumbled across this well-worn meme of the 7 deadly sins and social media so, as many of you come back from Las Vegas I thought it...
Aug 93 min read
Â
Â
Decoding Cybercrime's True Scope: Beyond the Trillion-Dollar Hype
As security specialists, we regularly see claims about the escalating scale of cybercrime, often hearing staggering claims that it’s a...
Jul 265 min read
Â
Â
Career Longevity & The Don't Fire Me Chart
One of the more common patterns of security program success vs. failure is how much leadership is prepared to stick with the work over...
Jul 122 min read
Â
Â
Cyber Insights Needed & Delivered
I thought I’d try something different and share some thoughts on the Cyentia Institute’s latest report, the Information Risk Insights...
Jun 284 min read
Â
Â
Segmentation Technologies / Zero Trust
This is an update to a post from 2001 which I’m revisiting in part because some things have changed, but also because (surprisingly) much...
Jun 142 min read
Â
Â
CISO / Cybersecurity Leader Job Description
There is a plethora of sample job descriptions for security leaders that are often strictly correct but can also be uninspiring or too...
May 313 min read
Â
Â
Scaling Security, AI and More....
I recently joined Clint Gibler (tl;dr sec) at RSA for a great discussion. In it we cover a wide array of topics from the challenge of...
May 201 min read
Â
Â
Starting a Security Program from Scratch (or re-starting)
I’ve had a number of requests to write a post about how to start and grow a new security program - or a substantial reassessment and...
May 1712 min read
Â
Â
CISO: Librarian, Archeologist or Explorer?
I first wrote this post back in 2021 so I thought it’s time for a revisit with an addition of a few more roles. We talk about attackers...
May 36 min read
Â
Â
bottom of page