The Disclaimer:
Just to be clear, nothing that I write here represents the position or opinion of my employer. Nothing I write here is proprietary or confidential to my employer. Everything I write here is my personal opinion.Pages
Subscribe to Security & Cigars
Follow me on Twitter
My Tweets-
Recent Posts
Archives
Recent Comments
- David Elfering on Back to Normal
- Terry Holberton on How To Get My Attention
- Vaughn Harring on Eric Update
- ecowper on Cigars
- Mike Childs on Cigars
Categories
- Alcohol
- Apple
- Being A Grown-Up
- Big Data
- Board Responsibilities
- BYOD
- Career
- Cigars
- Cloud
- Conferences
- Consumer Devices
- CyberWar
- Doing Adulting Right
- Food
- FUD
- General
- Government
- Health
- Home
- InfoSec
- Life and Times
- Military
- Mobility
- Pandemic
- Penetration Testing
- Please Advise
- Risk Management
- Security
- Smoking
- Teamwork
- Technology
- Travel
- Travel
- Uncategorized
- Vulnerability Management
Tag Archives: security
Back to Normal
Yesterday I was thinking about this whole “back to normal” thing that we are now experiencing. You know, COVID-19 vaccinations, and herd immunity, re-opening the economy and institutions, all of the things that are happening around us right now after … Continue reading
The Threat & Vulnerability Management Maturity Model Arrives
If you follow my blog, you know the Threat & Vulnerability Management Maturity Model has been in the works for a while now. I’m happy to report the full model has finally been published in Core Security’s latest white paper. What’s … Continue reading
Posted in InfoSec, Security, Vulnerability Management
Tagged CORE Security, cyber-security, information security, maturity model, risk management, security, vulnerability management
Comments Off on The Threat & Vulnerability Management Maturity Model Arrives
A Week in Vegas
Yep, here I am in Las Vegas. Sitting in my hotel room knocking out a quick post on the blog before heading down to check in for BlackHat and find people and dinner. I plan to write something every day, … Continue reading
What Is A Good Security Program?
What distinguishes a good security program? One of the hardest questions to answer in the Information Security field is whether our security program is good, or not. It’s a question we want to answer for many reasons, not least of … Continue reading
Posted in InfoSec, Penetration Testing, Risk Management, Security, Vulnerability Management
Tagged APT, Gartner, Good Security, infosec, security, The Basics
Comments Off on What Is A Good Security Program?
Blaming the Victim for the Crime
Putting the victim on trial. Decades ago we learned to stop putting victims of sexual abuse, domestic violence and rape “on trial”. Well, mostly anyhow. But we, mostly, stopped blaming the girl because she wore a short skirt or went … Continue reading
Posted in General
Tagged community, crime, cybercrime, fud, infosec, professional, security, victims
Comments Off on Blaming the Victim for the Crime
You Can’t Defend Without Intelligence
Imagine you are an Army General. And you have been given responsibility to defend a town that is the key to the local road network. You have a specific set of units under your command and several days to prepare … Continue reading
Posted in InfoSec, Security
Tagged Attack Intelligence, Checklists, Compliance, Defense, Intelligence, security
3 Comments
2013: A Roller Coaster
Or, as my wife put it, Random Ramblings of a Security Executive. Yes, it’s that time. Writing a blog post to wrap up the year, just all the rest of you do. I decided I’d cover my personal and professional … Continue reading
Posted in Career, Government, InfoSec, Life and Times, Security
Tagged 2013, 2014, CORE Security, cyber-, healthcare, infosec, personal life, professional life, security, travel
2 Comments
Day 3 at CORE
Yet another day of fun at CORE today. Spent the day getting to know the people, figuring out critical strategies, and places where I can start inserting myself to have some immediate impact. Started working on goals for the next … Continue reading
Posted in CyberWar, FUD, General, InfoSec, Life and Times
Tagged back doors, cyber-security, cyberwar, encryption, infosec, instapundit, NSA, security
Comments Off on Day 3 at CORE
Gartner Security Summit Keynote
Paul Proctor got on stage and captured the attention of 2400 security professionals. He lampooned the NSA, brought the ghosts of security on stage and even highlighted my organization for the changes we’ve been able to accomplish. Key themes: BYOD, … Continue reading
CITE 2013 Presentation on Mobility, BYOD, etc.
My presentation at the 2013 CITE Conference & Expo. If you didn’t know before this, now you do. I am a heretic when it comes to cloud, consumer devices, BYOD and …. well many things. I am reasonably sure on … Continue reading
Posted in BYOD, Cloud, Consumer Devices, Mobility, Security, Technology
Tagged BYOD, CITE, Cloud, Consumerization, Heresy, IDG, Mobility, security, Technology
Comments Off on CITE 2013 Presentation on Mobility, BYOD, etc.