1 min read
A Cautionary Note on Sensationalism in Cyber Security Headlines
This month’s focus is on the importance of double-checking the work of security researchers and headlines. We live in a fast-paced news cycle and a...
1 min read
This month’s focus is on the importance of double-checking the work of security researchers and headlines. We live in a fast-paced news cycle and a...
2 min read
As security practitioners and leaders, we must contribute to the professionalization of our field by searching out data and evidence-based solutions...
2 min read
We live in very polarizing times, particularly in the US. We choose our words carefully, tiptoe around topics that might devolve into argumentation...
3 min read
As I talk through the practical application of the security cost framework with our members, we are consistently running into a common stumbling...
4 min read
Key Points: TLP is a Sharing Protocol. Companies that do not share threat information are at a disadvantage. Overclassification stifles sharing...
3 min read
Phishing is a significant compromise vector for all companies in all industries. At theMining and Metals ISAC annual conference in November, we...
4 min read
After my last post on using Security Cost as a metric and the basis for a core security team/CISO objective, a few Mining and Metals ISAC members...
3 min read
What does a Greek god, a German philosopher, and a Museum Curator have to teach us about Cyber Threat Intelligence?
4 min read
Why? Why? Three letters, one powerful question. We all ask why. Possibly the very first question you've ever asked anyone was, "Why?"
2 min read
Now that most MM-ISAC member organizations impacted by CrowdStrike's issue on Friday are through the worst of the recovery, I want to share some...