top of page
Search
Is Complexity the Enemy of Security?
One of the many pieces of accepted wisdom in information/cybersecurity is that complexity is the enemy of security. But is it? You...
May 8, 20217 min read
4,231 views
Leadership, Business, Security and Risk Reading List
This is my list of favorite books across the various professional disciplines I’m interested in. I have a set of favorite books that are...
Apr 24, 20211 min read
3,164 views
Cybersecurity : The Winner’s Game and The Loser’s Game
There is a seminal paper in finance by Charles Ellis called the The Loser’s Game which, in simple terms, foretells the move from active...
Mar 27, 20215 min read
2,349 views
Return on Investment for Security
The concept of return on investment (ROI) for security has bugged me for a long time. Not because it isn’t a laudable goal. Of course,...
Mar 13, 20214 min read
5,559 views
Research Challenges in Info/Cybersecurity - Part 2: “Carbon”
This is the second part of the post from 2 weeks ago, which explored research challenges in Info/Cybersecurity related to systems:...
Feb 13, 20214 min read
838 views
Research Challenges in Info/Cybersecurity - Part 1: “Silicon"
This is the first of a two part post on research challenges centered on systems, computer science and engineering research challenges....
Jan 30, 20215 min read
1,003 views
Situational Drivers of Cyber-Risk
Many years ago I wrote down a list of the drivers that create information / cyber-risk or that otherwise compel the need to mitigate this...
Jan 17, 20213 min read
2,085 views
Privilege Management Program - Governance
I can’t recall having seen an overview of a systematized privilege management program. There are lots of great articles on specific...
Dec 19, 20205 min read
2,384 views
Security Ratings: Love, Loathe or Live With Them?
Security ratings services tend to be loved or loathed. Loved if you consume them and it makes your job easier, especially if you have no...
Dec 13, 20208 min read
4,167 views
The Seat at the Table: Integrating Security into your Business
The success of a security program is largely determined by how well it is integrated into the fabric of the organization, in terms of...
Dec 6, 20206 min read
2,065 views
Simple Rules of (InfoSec) Career Success - Updated
Over the years I've noted the behaviors I’ve seen from consistently successful people. In this context I define success as a balance of...
Nov 29, 20203 min read
1,651 views
Scenario Planning - The Best Technique You Might Not Be Using
Scenario planning is one of the most underutilized techniques in security. Which is surprising given how effective it is in [good]...
Nov 22, 20205 min read
2,689 views
Principles for Cybersecurity Metrics
“For every metric, there should be another ‘paired’ metric that addresses adverse consequences of the first metric.” - Andy Grove We talk...
Nov 8, 20204 min read
3,921 views
The Uncanny Valley of Security (or Why We Might Never Finish Anything)
The uncanny value is a famous term in robotics. It is used to describe how we accept robots that don’t attempt to look too human, but,...
Nov 1, 20207 min read
3,072 views
Cybersecurity Macro Themes for the 2020’s - Updated
There will be 6 major themes that differentiate great security programs, products, features and processes. These are different from...
Oct 25, 20204 min read
1,797 views
Why Cybersecurity Budget Benchmarks are a Waste of Time
I have built up a disdain for cybersecurity budgeting benchmarks. To be fair, there are some good attempts amid a sea of haphazard...
Oct 18, 20203 min read
2,716 views
Vulnerability Management - Updated
It still surprises me that much of the tone of vulnerability management is about patch/bug fix vs. detecting broader configuration and...
Oct 13, 20202 min read
2,256 views
Security for More than Security’s Sake - The Need for Adjacent Benefits
Truly excellent security programs deliver more than security risk mitigation. I know it is kind of ridiculous to say that when doing the...
Oct 4, 20204 min read
1,276 views
The Most Important Mental Models for CISOs - Simple Steps for Outsize Effects
There are lots of problem solving techniques across many fields. These are often represented as mental models or behavioral short-cuts....
Sep 27, 20205 min read
2,280 views
The Rising Tide and the Case for Security Optimism
Continuing with the theme of raising the baseline by reducing the cost of control we can see the next logical progression is that the...
Sep 20, 20203 min read
859 views
bottom of page