Your vulnerability management is broken (this is the FIX)

OK hear me out, I know vulnerability management is an old practice. Why are we even talking about it, it’s not broken, right? For most companies, it is very broken even if it appears to be working. These broken…

Rock solid Splunk or: How I learned to love Splunk Validated Architectures

Splunk can be a complex beast, with its various components, requirements, and best practices on top of the OS selection and infrastructure design…deploying it can feel like an impossible task. Lucky for us, Splunk has created Validated Architectures that…

The 3 questions to ask during an cybersecurity interview

Interviewing, and being interviewed for that matter, can be a stressful event.  If your like me, than it doesn't matter which side of the table your on.  You approach this situation with the same focus and zeal you…

An introduction to the Cryptocurrency Security Standard (CCSS)

The Cryptocurrency Security Standard (CCSS) Good morning everyone, today I bring to you a short post on a relatively new development in the crypto-cyber security world. First lets level set with everyone so we can understand why we are talking…

Your guide to DeFi aka OPEN finance

If you think back to my introduction to Crypto, which is found here: https://infosecforhumans.com/crypto-for-humans-or-anyone-in-tech/ [Crypto 101 for humans] - You will remember that crypto is attractive because it is decentralized, not controlled by a central bank or…

Crypto 101 for humans (or anyone in tech)

-------------------------------------------------------------------------------- Hello crypto In this article I want to introduce some critical concepts for success in the crypto world.  The ideas covered in this blog post are aimed at anyone who still feels like crypto just isn't for…

Who should the CISO report to?

For my non-technical friends and people who are on the perimeter of tech (or even security for that matter), the question of who does the CISO report to is a not a question at all. They always espouse the standard…

What is the Minimum Viable Secure Product (MVSP)? And why should I care?

What problem does it solve? The way we approach vendor risk management today is built around the concept of asking questions through questionnaires.  The questionnaires are almost always a "one off" for each organization, which brings with them…

MFA Factors: Knowledge

In the previous post we level set and I discussed how the CISA has classified "single" factor authentication (aka passwords alone) as a bad practice.  We also reviewed at a high level what MFA is and the major…

MFA: Types of factors

Recently CISA moved the use of a single factor (password for instance) into the category of "bad practices".  Listen, its time!  You should be adopting multifactor authentication (MFA) for everything.  CISA moving 1FA onto the naughty list just…

Types of security frameworks

If you are here, reading this than I can assume you have questions.  Maybe you have just started your search and stumbled across this article, but it’s also just as likely you have been searching for a while and…

The New CISO: What type of CISO are you?

Let me share a story with you... Picture this, an “executive” level meeting is called at a medium sized organization.  The invitation included the CEO, CFO, CISO, COO, VP of IT, a Sr. Engineer from the technical team & the…