“Come on tell me who are youOh, I really wanna know” If there was ever one song recorded that captured the essence of what we do as security, I’d have to give it to the classic “Who Are You” by the Who—especially after the deep dive into thinking about authentication and access control I did […]
Security heroes
The cynical definition of a “hero” is one I remember spouting off in meetings not so many years ago. I was a bit more jaded then. Maybe I had a reason, but maybe I didn’t. Looking back on it now, I’m actually not sure. But I do remember what I said about heroes on more […]
Calibrating your cloning machine
When you learn something new, there’s two main problems you need to solve. The first, obviously, is how to put what you’ve learned into practice. This can take many forms. You can take a reference – like a book, a video, your notes, photos or even just what you remember –and you can make the […]
Stepping in mythical maturity mud puddles
While this is something I’ve written about before, it’s not normally something that comes up quite so strongly and quite so often in the same day. That “something” is the myth of some magical level of maturity in your security program when “things will happen.” When we get [magical maturity level], then we can be […]
If you want to improve your security program, this is how NOT to think…
Today I was scrolling through my LinkedIn feed, and I came across this gem. I won’t attribute credit here, because it wasn’t about security, but I can tell you that from my experience, this thought has been echoed by many a security person in the past—including me, I’m sorry to say: === In my experience […]
- 1
- 2
- 3
- 4
- Next Page »