top of page
Search
Regulatory Harmonization - Let’s Get RealÂ
Every few months some association or other learned group of professionals makes a fresh call to action for cybersecurity regulatory...
Nov 30, 20247 min read
Â
Â
Lessons in Crisis Management - Top 10 Disaster MoviesÂ
I’ve previously posted about some of the best security movies made  but I have to confess I’m not a big fan of the genre. They tend not...
Nov 16, 20243 min read
Â
Â
Risk Appetite and Risk Tolerance - A Practical Approach
If you work for a large organization, especially public or otherwise regulated companies, then you may well have faced the prospect of...
Nov 2, 202413 min read
Â
Â
Threat Hunting: Real World vs. Cyber World
It’s puzzling that there aren’t more articles comparing and contrasting wildlife hunting techniques with cyber threat hunting, or maybe...
Oct 19, 20247 min read
Â
Â
Job Interviews: Part 2 Conducting the Security Interview - The Big 10
This is the second of two posts about interviews (the first post is here ). In this one I’ll focus on interviewing candidates and the...
Oct 5, 202417 min read
Â
Â
Job Interviews: Part 1 Acing the Security Interview - 10 Top Tips
This is the first of two posts about interviews. In this one I’ll focus on interviewing for a role. In the next one we’ll look at how to...
Sep 21, 202411 min read
Â
Â
6 Truths of Cyber Risk Quantification
I wrote the original version of this post over 4 years ago. In revisiting this it is interesting to note that not much has actually...
Sep 7, 20248 min read
Â
Â
Ethics and Computer Security Research
If we are to keep advancing the fields of information / cybersecurity, technology risk management and resilience then we need to apply...
Aug 24, 20246 min read
Â
Â
Security Training & Awareness - 10 Essential Techniques
Security training is often considered a bit of a waste of time. Maybe this is unfair, but unsurprising in the face of the worst forms of...
Aug 10, 202416 min read
Â
Â
33 Computer Programs That Changed the WorldÂ
This is a slight departure from my normal security and risk management topics, but is something I’ve been getting more interested in....
Jul 27, 20247 min read
Â
Â
Why Good Security Fails: The Asymmetry of InfoSec InvestmentÂ
One of the many paradoxes of security is that when you have invested appropriately (sometimes at significant expense) and you have less...
Jul 13, 20245 min read
Â
Â
Human Error
Several years after writing the first version of this blog I still see a repeated pattern of problematic events attributed to human...
Jun 29, 202410 min read
Â
Â
bottom of page

