Choosing the Right Participants: A Guide to Inviting Stakeholders for Your Cyber Tabletop Exercise
Introduction In the ever-evolving landscape of cyber threats, organizations must prioritize preparedness to effectively mitigate risks...
Launch Your Cybersecurity Career with Certified in Cybersecurity (CC) from (ISC)²
(ISC)², Inc. is offering a great opportunity to get into cybersecurity. They are offing a new entry-level certification with the...
Cyber Risk Update 31 MAR 2023
Here is the cyber risk update for the week of 31 March 2023. Reports Malwarebytes State of Malware 2023 https://try.malwarebytes.com/2023...
National Security Threats Facing the United States: Insights from H.R. McMaster
In the course "National Security Threats Facing the United States," by the Great Courses, renowned expert H.R. McMaster discusses a...
Getting Something Going and Improving Over Time
Getting Something Going and Improving Over Time: The Power of MVP, Marginal Performance Gains, and Planned Neglect Starting a new project...
Balancing Effort and Outcome
Balancing Effort and Outcome: The Value of Planned Neglect in Achieving Success and Avoiding Burnout. During a past TechEd conference, I...
Does Security Awareness Work?
According to the Verizon 2018 Data Breach Report, 93% of data breaches are linked to phishing or social engineering. With stats like...
Five Challenges of Computer Security
A Paper I wrote for American Military University, Criminal Justice Department Introduction After a recent lecture on information systems...