Why Detection Without Understanding Is Just Noise

0 Comments

Most security operations environments that I have had the luck of seeing, look impressive. They have dashboards everywhere, there are alerts firing and their SIEM is lit up like it’s doing something meaningful. From anyone on the outside, it reads as a mature, well-instrumented program. From the inside…if you’re really honest about it, is a […]

When Security Architecture Depends on Tribal Knowledge

0 Comments

There is a moment in almost every organization when someone says a phrase that sounds reassuring on the surface but I hope should make security leaders just a little uncomfortable: “Don’t worry, Mike knows how that works.” (no real Mike’s are used in today’s example). Mike I’m sure is a great guy, he’s been with […]

The Security Implications of Over-Automation

0 Comments

Not long ago I was in a conversation with a few other security leaders about automation. It started the way these conversations often do, someone mentioned how much faster their team was able to respond to alerts since implementing automated workflows. Another person talked about automatically isolating compromised endpoints upon alerts and someone else described […]

The Silent Risk of Inconsistent Time Synchronization

0 Comments

If you’ve been in any level of incident response, there is a moment in the conversation when someone asks a deceptively simple question: “When did this start?” It sounds like a straightforward request…after all, security teams collect logs, alerts, and telemetry from systems across the organization. We have dashboards, SIEMs and sometimes monitoring platforms that […]

Learning that mistakes might be the best career move you never planned (I hope)

0 Comments

I announced two weeks ago, that I in the job market after a short tenure at a company. I learned that there is a sentence that feels heavier than it should. “I’m back on the job market.” It lands with a thud, even when no one else reacts. It immediately invites a flood of questions. […]

Securing Beyond the Standard: Building a Culture of Lasting Security

0 Comments

AI Generated

Helping Your Users Stay Safe Online Helps to Keep the Office From Catching Fire (You Know…Metaphorically Speaking)

0 Comments

I have rarely seen any Cyber Security Awareness Training at any company, explaining how I can take care of my assets, how I can avoid falling for scams or other things to help my browsing online. Now for me, that’s not a problem, I’ve been in IT and Information Security my whole life, and I’m cautious when I’m online at home or work, but I want to talk about why I would like that to change. Why training employees to be more suspicious online, can and will help them to be better at work.

Back to work: Security Thoughts to Have

0 Comments

In fact, with so many people returning to the office and potentially accessing sensitive information on your organization’s network, it’s more important than ever to ensure that proper security measures are in place. Either fully remote or fully in-the-office work can be thought of as a “fortress” approach to security, with the primary point of access being through the employee’s personal or organizational computer.

How to protect yourself from email scams

0 Comments

What to look for (or what I look at), to avoid an email scam during this holiday season…or really any season.

Q&A Monday: What is CVSS?

0 Comments

Question: I am a recent graduate, who just got a job working in IT at a company. During a meeting today, someone mentioned a CVSS score on a system that needed to be patched. I was afraid to ask during the meeting, but what is CVSS? Kenneth M. PonceWashington DC Answer: Before I get to […]