The Disclaimer:
Just to be clear, nothing that I write here represents the position or opinion of my employer. Nothing I write here is proprietary or confidential to my employer. Everything I write here is my personal opinion.Pages
Subscribe to Security & Cigars
Follow me on Twitter
My Tweets-
Recent Posts
Archives
Recent Comments
- David Elfering on Back to Normal
- Terry Holberton on How To Get My Attention
- Vaughn Harring on Eric Update
- ecowper on Cigars
- Mike Childs on Cigars
Categories
- Alcohol
- Apple
- Being A Grown-Up
- Big Data
- Board Responsibilities
- BYOD
- Career
- Cigars
- Cloud
- Conferences
- Consumer Devices
- CyberWar
- Doing Adulting Right
- Food
- FUD
- General
- Government
- Health
- Home
- InfoSec
- Life and Times
- Military
- Mobility
- Pandemic
- Penetration Testing
- Please Advise
- Risk Management
- Security
- Smoking
- Teamwork
- Technology
- Travel
- Travel
- Uncategorized
- Vulnerability Management
Category Archives: Security
The Threat & Vulnerability Management Maturity Model Arrives
If you follow my blog, you know the Threat & Vulnerability Management Maturity Model has been in the works for a while now. I’m happy to report the full model has finally been published in Core Security’s latest white paper. What’s … Continue reading
Posted in InfoSec, Security, Vulnerability Management
Tagged CORE Security, cyber-security, information security, maturity model, risk management, security, vulnerability management
Comments Off on The Threat & Vulnerability Management Maturity Model Arrives
23 Years is a Long Time
I woke up in the Middle East this morning. In Dubai in the United Arab Emirates, to be precise. This isn’t the first time I have been in the Middle East. I’ve been to Saudi Arabia, Kuwait, Iraq, Egypt and … Continue reading
Posted in Conferences, Travel
Tagged cigar, cyber-security, Desert Storm, Dubai, GITEX, middle east, UAE
Comments Off on 23 Years is a Long Time
Another Preventable Breach
Another entry in the “Preventable Breach” and “We could have prevented this” columns. This appears to be all about change and configuration management. An area that really needs some work, clearly. Brian Krebs announced last night that there has been a … Continue reading
Posted in InfoSec, Security, Vulnerability Management
Tagged breaches, change management, Krebs, leaks, maturity model
Comments Off on Another Preventable Breach
Year One
It’s the end of Year One at Core Security. Time really flies when you’re having fun. I’ve been here for 12 months now, and a couple days, and I guess I should do the “looking back after the first year” … Continue reading
Posted in Career, Cigars, InfoSec, Security, Vulnerability Management
Comments Off on Year One
The Maturity Model … Matures
We are making good progress with the Vulnerability Management Maturity Model now. We have a very nice looking graphic that aligns activity across each stage of maturity. Next steps include demonstrating the business value of improving maturity, providing an assessment … Continue reading
Posted in InfoSec, Risk Management, Security, Vulnerability Management
Tagged maturity model
Comments Off on The Maturity Model … Matures
Thinking About BlackHat – The Suits vs. The Shorts
One of the interesting things about BlackHat is that hackers and CISOs rub elbows. One of the few places where that happens routinely. It’s kinda funny. The CISOs are trying not to look so much like a “suit”, so they … Continue reading
Posted in Conferences, CyberWar, FUD, Security
Tagged BlackHat
Comments Off on Thinking About BlackHat – The Suits vs. The Shorts
Just A Few Things Left
That’s right, not too much more left here at BlackHat. A couple of meetings with customers, a couple of analysts. And of course, Core’s party at the RX Boiler Room. Which is supposed to be pretty epic. Then I’m gonna … Continue reading
Vulnerability Management Maturity Model
I’ve been working on this for a couple months now. Basically, we all know the truth of the matter is that intrusions happen because we security guys are not able to patch the things that matter, fix the areas that intruders … Continue reading
Posted in Conferences, InfoSec, Security, Vulnerability Management
Tagged attack paths, bad guys, data overload, maturity, Vulnerability Insanity, vulnerability management
Comments Off on Vulnerability Management Maturity Model
A Week in Vegas
Yep, here I am in Las Vegas. Sitting in my hotel room knocking out a quick post on the blog before heading down to check in for BlackHat and find people and dinner. I plan to write something every day, … Continue reading
August: Something I Swore I’d Never Do
No, not August, actually. It comes every year and it would be a bit awkward to swear off of August. Imagine me having to basically go into some sort of hibernation for 31 days. What I swore I’d never do … Continue reading
Posted in Career, Conferences, Life and Times, Security
Tagged August, BlackHat, BSidesLV, conferences, DefCon, Las Vegas
Comments Off on August: Something I Swore I’d Never Do