The Asset Trap
As we look at what's happened with the Russian attack on the US government and others via Solarwinds, I want to shine a spotlight on a lesson we can apply to threat modeling.
As we look at what's happened with the Russian attack on the US government and others via Solarwinds, I want to shine a spotlight on a lesson we can apply to threat modeling.
Thoughts on the recent Fireeye Hack and the culture surrounding breaches
Thoughts on Mark Rasch's essay, Conceal and Fail to Report - The Uber CSO Indictment
I want to call out some impressive aspects of a report by Proofpoint.
Understanding the way intrusions really happen is a long-standing interest of mine.
What have we learned and what steps can we take?
I'm happy to say that some new research by Jay Jacobs, Wade Baker, and myself is now available, thanks to the Global Cyber Alliance.
The House Oversight Committee has released a scathing report on Equifax...
I still have questions...
[no description provided]
[no description provided]