Home
Your vulnerability management is broken (this is the FIX)
OK hear me out, I know vulnerability management is an old practice. Why are we even talking about it, it’s not broken, right? For most companies, it is very broken even if it appears to be working. These broken…
Chris Ray
Nov 21, 2022
Rock solid Splunk or: How I learned to love Splunk Validated Architectures
Splunk can be a complex beast, with its various components, requirements, and best practices on top of the OS selection and infrastructure design…deploying it can feel like an impossible task. Lucky for us, Splunk has created Validated Architectures that…
Chris Ray
Nov 18, 2022
The 3 questions to ask during an cybersecurity interview
Interviewing, and being interviewed for that matter, can be a stressful event. If your like me, than it doesn't matter which side of the table your on. You approach this situation with the same focus and zeal you…
Chris Ray
Jan 11, 2022
An introduction to the Cryptocurrency Security Standard (CCSS)
The Cryptocurrency Security Standard (CCSS) Good morning everyone, today I bring to you a short post on a relatively new development in the crypto-cyber security world. First lets level set with everyone so we can understand why we are talking…
Chris Ray
Jan 8, 2022
Your guide to DeFi aka OPEN finance
If you think back to my introduction to Crypto, which is found here: https://infosecforhumans.com/crypto-for-humans-or-anyone-in-tech/ [Crypto 101 for humans] - You will remember that crypto is attractive because it is decentralized, not controlled by a central bank or…
Chris Ray
Jan 7, 2022
Crypto 101 for humans (or anyone in tech)
-------------------------------------------------------------------------------- Hello crypto In this article I want to introduce some critical concepts for success in the crypto world. The ideas covered in this blog post are aimed at anyone who still feels like crypto just isn't for…
Chris Ray
Jan 6, 2022
Who should the CISO report to?
For my non-technical friends and people who are on the perimeter of tech (or even security for that matter), the question of who does the CISO report to is a not a question at all. They always espouse the standard…
Chris Ray
Jan 6, 2022
What is the Minimum Viable Secure Product (MVSP)? And why should I care?
What problem does it solve? The way we approach vendor risk management today is built around the concept of asking questions through questionnaires. The questionnaires are almost always a "one off" for each organization, which brings with them…
Chris Ray
Oct 28, 2021
MFA Factors: Knowledge
In the previous post we level set and I discussed how the CISA has classified "single" factor authentication (aka passwords alone) as a bad practice. We also reviewed at a high level what MFA is and the major…
Chris Ray
Oct 15, 2021
MFA: Types of factors
Recently CISA moved the use of a single factor (password for instance) into the category of "bad practices". Listen, its time! You should be adopting multifactor authentication (MFA) for everything. CISA moving 1FA onto the naughty list just…
Chris Ray
Sep 14, 2021
Types of security frameworks
If you are here, reading this than I can assume you have questions. Maybe you have just started your search and stumbled across this article, but it’s also just as likely you have been searching for a while and…
Chris Ray
Sep 9, 2021
The New CISO: What type of CISO are you?
Let me share a story with you... Picture this, an “executive” level meeting is called at a medium sized organization. The invitation included the CEO, CFO, CISO, COO, VP of IT, a Sr. Engineer from the technical team & the…
Chris Ray
Sep 2, 2021
Page 1 of 3
Older Posts