Is your frontend leaking data to third parties? The top 1000 websites are.We scanned the top 1000 domains from Cloudfare Radar. If you’re not sure about your third parties, use https://wpdc.org/ to monitor your…Nov 8, 2024Nov 8, 2024
Enterprise (or Corporate) Security FrameworkEnterprise Security (or Corporate Security) is responsible for all the risk in your business assets and enterprise IT, including your…Jul 29, 2024Jul 29, 2024
Breach Readiness FrameworkEvery organization is going to experience a breach. Be prepared.Feb 5, 2024A response icon1Feb 5, 2024A response icon1
Data Governance FrameworkData Governance is the security team’s responsibility for understanding, identifying, inventorying, classifying, discovering, and…Oct 19, 2023A response icon1Oct 19, 2023A response icon1
Security Operations FrameworkSecurity Operations is the technology, controls, and processes that allow a security organization to be able to prevent, detect, and…Apr 5, 2021Apr 5, 2021
An Adversary’s Perspective: 2FABefore you turn on 2FA, think about it from an an adversary’s perspective.Mar 10, 2021Mar 10, 2021
Seven Deadly Sins of Security TeamsWhen I talk to organizations and executives, I see the same security mistakes and misconceptions over and over. I see security leaders…Jan 19, 2021A response icon1Jan 19, 2021A response icon1
Mature Controls at Any SizeIn this article I will describe a set of basic controls you can implement and scale that any size organization should have.Jul 7, 2020A response icon1Jul 7, 2020A response icon1
What You Need To Know About Cyber InsuranceMany organizations use cyber insurance to satisfy legal or regulatory requirements, as a financial risk mitigation, or as a last resort…Jun 29, 2020Jun 29, 2020
Adversary-Based Risk AnalysisMost risk analysis is done by assessing potential impact and ease of an attack. This kind of risk analysis that’s done in the absence of…Mar 25, 2020Mar 25, 2020