Inclusive Design in Information Security
In the spirit of James Clear’s Atomic Habits and tiny changes leading to remarkable results, here’s a reminder around usability and design in your security… Read More »Inclusive Design in Information Security
Security content from Leo Nelson
In the spirit of James Clear’s Atomic Habits and tiny changes leading to remarkable results, here’s a reminder around usability and design in your security… Read More »Inclusive Design in Information Security
If you’re interested in the First 90 Days template that I’ve used for reflecting a roadmap as well as updates as a new CISO in… Read More »CISO – The First 90 Days – Template
Cipher Suite Info – a handy service for reviewing cipher suites and especially for identifying weak ciphers from Hans Christian Rudolph and Nils Grundmann. Each… Read More »Cipher Suite Search
Hoek shares some tips for hardening Windows Defender in your environment covering: Enabling Microsoft Advanced Protection Service (MAPS) Configuring Block at First Sight Enabling Ransomware… Read More »Windows Defender Hardening
In The Three Lenses: A Guide to Understanding Organizations, John Carroll presents a framework for understanding organizations. This was an interesting read, especially as initiatives… Read More »Three Lenses to Understanding Organizations
As mentioned in Gartner’s overview of CARE (Consistent, Adequate, Reasonable and Effective), Traditionally, cybersecurity priorities and investments have been largely based on achieving a capability,… Read More »The CARE Standard for Cybersecurity