top of page
Search
Principles for Cybersecurity Metrics
“For every metric, there should be another ‘paired’ metric that addresses adverse consequences of the first metric.” - Andy Grove We talk...
Nov 8, 20204 min read
3,916
The Uncanny Valley of Security (or Why We Might Never Finish Anything)
The uncanny value is a famous term in robotics. It is used to describe how we accept robots that don’t attempt to look too human, but,...
Nov 1, 20207 min read
3,069
Cybersecurity Macro Themes for the 2020’s - Updated
There will be 6 major themes that differentiate great security programs, products, features and processes. These are different from...
Oct 25, 20204 min read
1,797
Why Cybersecurity Budget Benchmarks are a Waste of Time
I have built up a disdain for cybersecurity budgeting benchmarks. To be fair, there are some good attempts amid a sea of haphazard...
Oct 18, 20203 min read
2,712
Vulnerability Management - Updated
It still surprises me that much of the tone of vulnerability management is about patch/bug fix vs. detecting broader configuration and...
Oct 13, 20202 min read
2,251
Building Balanced Security Teams: The Rule of Thirds
As an industry we spend a lot of time talking about workforce development and skills shortages. We tend not to talk about how to organize...
Oct 10, 20204 min read
3,074
Security for More than Security’s Sake - The Need for Adjacent Benefits
Truly excellent security programs deliver more than security risk mitigation. I know it is kind of ridiculous to say that when doing the...
Oct 4, 20204 min read
1,270
The Most Important Mental Models for CISOs - Simple Steps for Outsize Effects
There are lots of problem solving techniques across many fields. These are often represented as mental models or behavioral short-cuts....
Sep 27, 20205 min read
2,279
The Rising Tide and the Case for Security Optimism
Continuing with the theme of raising the baseline by reducing the cost of control we can see the next logical progression is that the...
Sep 20, 20203 min read
858
Raise the Baseline by Reducing the Cost of Control
One of the most successful techniques for enterprise security in many organizations is to create a universal baseline of controls that...
Sep 13, 20204 min read
1,682
Taking Inventories to the Next Level - Reconciliation and Triangulation
We know it is important to have good inventories across all of the assets we care about in an enterprise. For security purposes this is,...
Sep 6, 20203 min read
1,273
Security Budgets - Supply and Demand Thinking
How you obtain and manage a budget to drive an adequate level of security is immensely important. Yet, it is one of the least discussed...
Aug 29, 20205 min read
2,125
bottom of page