top of page
Search
Nov 22, 20205 min read
Scenario Planning - The Best Technique You Might Not Be Using
Scenario planning is one of the most underutilized techniques in security. Which is surprising given how effective it is in [good]...
2,595 views
Oct 13, 20202 min read
Vulnerability Management - Updated
It still surprises me that much of the tone of vulnerability management is about patch/bug fix vs. detecting broader configuration and...
2,228 views
Sep 20, 20203 min read
The Rising Tide and the Case for Security Optimism
Continuing with the theme of raising the baseline by reducing the cost of control we can see the next logical progression is that the...
852 views
Sep 6, 20203 min read
Taking Inventories to the Next Level - Reconciliation and Triangulation
We know it is important to have good inventories across all of the assets we care about in an enterprise. For security purposes this is,...
1,251 views
May 17, 20203 min read
Crypto isn’t the Only Cyber Issue in a Post Quantum World
Let’s assume general purpose quantum computers that can operate usefully at scale are coming. I think a reasonable timeframe is 15 years....
693 views
May 9, 20202 min read
Think Twice Before Switching Off Controls : Chesterton's Fence
Chesterton's Fence is a cautionary tale to make sure that before you change things you actually understand their purpose. This is...
2,551 views
Feb 2, 20205 min read
Dealing with the Deluge of Vendors
Everyone is deluged with approaches from product and service vendors, small and large. Even vendors struggle to keep track of who their...
1,549 views
Jan 19, 20204 min read
Operational Resilience
The Bank of England has recently released a sequence of consultation papers, after an earlier discussion paper, laying out a framework...
2,477 views
Jan 1, 20203 min read
Predictions and Calls to Action
It’s that time of year for all the predictions of what to expect for the next year, and now - the next decade. I’m generally not a fan of...
133 views
Nov 10, 20191 min read
Shrines of Failure
I was at an event recently where one participant talked passionately about a disaster they had that they have since preserved artifacts...
668 views
Sep 1, 20192 min read
Vulnerability Management
I don’t see much written on vulnerability management in more holistic terms vs. patch/bug fixing. This might be ok given a lot of...
224 views
May 24, 20191 min read
Coding Skills and Security
I've increasingly found, with respect to coding, security has come full circle. Those of us who started in the 80's/90's had to code (or...
814 views
Feb 12, 20192 min read
Technology - Retrospective
In the late 1980’s I was a developer using virtualized systems and containers, software defined networks, thin-client end points that...
628 views
bottom of page