This morning I was listening to a talk by Ken McCarthy, and he said something that I knew, but that I really hadn’t thought about for a while. Now you might not know who Ken McCarthy is, because he has absolutely nothing to do with security. He’s a marketing guy. But if you’ve been playing […]
Don’t read this post unless you’re funding your own security skill development
I’ll keep this short and to the point. As you probably know, I’ve been harping on about the next run of our Building Effective Security Architectures course for a few weeks now, and as of today, we’re exactly 1 month from when everyone who’s already joined the program will have access to the first week’s […]
How to be smarter than me
I’ve actually been debating whether or not I’d tell this story for most of the weekend, because, frankly, it’s a bit embarrassing. However, after going back-and-forth quite so many times, I finally decided that I’d share it with you so that maybe you’d end up being not quite so bull-headed and mistaken as I was. […]
Who owns your calendar—really?
One of the things that I’ve heard from people, since I’ve started yammering on about the February cohort of Building Effective Security Architectures in response to the course requirements of 5-10 hours per week for 7 weeks, was a concern about how they would fit it in to their existing workload. And it’s a truly […]
The fork without the devil or the sinkin’ cybersecurity soul
You might remember that I’m a fan of the Blues. In fact, when I do manage to find the time to do some cooking, my go-to streaming radio station is a broadcast Blues station from Mississippi that generally has an excellent mix of classics and new stuff. One of the songs I heard recently was […]