

Choosing the Right Participants: A Guide to Inviting Stakeholders for Your Cyber Tabletop Exercise
Introduction In the ever-evolving landscape of cyber threats, organizations must prioritize preparedness to effectively mitigate risks...


Launch Your Cybersecurity Career with Certified in Cybersecurity (CC) from (ISC)²
(ISC)², Inc. is offering a great opportunity to get into cybersecurity. They are offing a new entry-level certification with the...


Cyber Risk Update 31 MAR 2023
Here is the cyber risk update for the week of 31 March 2023. Reports Malwarebytes State of Malware 2023 https://try.malwarebytes.com/2023...


From Heroes to Icons: Using Exemplars to Remind Us of Virtues
I recently finished listening to a captivating Great Courses series entitled "Heroes and Legends, The Most Influential Characters of...

National Security Threats Facing the United States: Insights from H.R. McMaster
In the course "National Security Threats Facing the United States," by the Great Courses, renowned expert H.R. McMaster discusses a...


The Art of Continuous Improvement: Lessons from a Lifelong Learner
"Live as if you were to die tomorrow. Learn as if you were to live forever." - Mahatma Gandhi As an advocate of lifelong learning and...

Getting Something Going and Improving Over Time
Getting Something Going and Improving Over Time: The Power of MVP, Marginal Performance Gains, and Planned Neglect Starting a new project...


Balancing Effort and Outcome
Balancing Effort and Outcome: The Value of Planned Neglect in Achieving Success and Avoiding Burnout. During a past TechEd conference, I...

Does Security Awareness Work?
According to the Verizon 2018 Data Breach Report, 93% of data breaches are linked to phishing or social engineering. With stats like...

Five Challenges of Computer Security
A Paper I wrote for American Military University, Criminal Justice Department Introduction After a recent lecture on information systems...