A collection of information security metrics and statistic resources to use when discussing the state of information security. Many of the typical suspects are here – DDoS, Ransomware, SPAM, Insider Threats, DevOps, as well as many others.
I recently had a wonderful opportunity to sit in on a panel discussing how the pandemic is going to change the way security practitioners think about protecting their organizations.
I had the honor of participating in the LinkedIn Live event on some of the scarest things I have ever heard from my security team.
I had an opportunity to reflect on what is takes to be a CISO, how I got here, and where I think the industry is heading.
Panel discussion on third-party risk. Topics included conducting software composition analysis (SCA), assessing threats and impacts, risk-rating your inventory, and selecting the right controls.
An interview with the Wall Street Journal around the rapid uptick in enterprise attacks seen amongst the initial weeks of the COVID-19 outbreak.
The Weekly Hotwash: A new study on password entropy highlights worrying statistics on how common passwords are across the userbase.
An interview with the Wall Street Journal around the need for an effective identity management solution to manage the rapid growth of the remote workforce.
The Weekly Hotwash: The charade of DDOS booter service takedowns and the death toll for Adobe Flash has begun; will it be as beneficial as we hope?
The Weekly Hotwash: The explosion of phishing and SPAM during 2020 is a direct attack on our users. It is time to rethink email security.
In holding myself accountable to my own call-to-action, I have dedicated a page to share all of the diversity-centric resources I have collected over the years. From How-To guides to sites that use lexiconic analysis of job postings to ensure they are bias-free, to awareness training tools, to volunteer organizations.
The Weekly Hotwash: 5 of the top 8 threats can be mitigated with programmatic identity management. Are you considering the value such programs bring?
An interview I did with Ericka Chickowski of DarkReading on the importance of useability of security products.
The outrage over the George Floyd murder is causing many to push for change. Will you use your outrage to fix the diversity issues you see every day?
The Weekly Hotwash: The demise of SHA-1 is a road sign on the deterioration of security controls and how embedded open-source unknowingly introduces risk.
Chronicles of a CISO was named 2020 Best New Blog of the Year by the Security Blogger Network
The Weekly Hotwash: How a study of pandemic statistical reporting can help you develop better security metrics.
The Weekly Hotwash: The CISSP vs Masters firestorm and revisiting the secure application development process.
The Weekly Hotwash: Why the hiring process is more to blame than the lack of InfoSec resources and the new NIST Secure Software Development Standards
A recent interview I did with SearchSecurity/TechTarget. While much was about the benefits and love of the job, the ‘job churn’ and ‘burnout’ discussions are front and center in the industry these days.
A Major Step in Federated Identity Management If you have followed my blog for any amount of time, you know that I am a firm believer that user account federation …
The Weekly Hotwash – A New CoaC Feature Welcome to the first CoaC Weekly Hotwash; a recap of the past week’s news and the implications the stories may have on …
This page will list various personal and family-related ‘remote’ STEM activities to participate in as well as other free offerings to help companies, individuals and families cope with their newfound way of working.
A few tried-and-true practices to keep you productive and sane while spending an unexpected few weeks in the home office.
As a hiring manager, how does someone make a person go through three video interviews, do two coding assignments, be so impressed with the coding that they then fly the person up for in-person interviews, and only then decide the coding skills aren’t exactly what they are looking for?!?