I’ve seen yet another special forces (operator) book on leadership, or military general talking about leadership. I’m not going to say they have nothing to say about it but I’m a bit rankled by the fan boys. I’ve been in…
Category: Technology
The term “technology” does not follow the same linguistic pattern as “biology” and “geology” because its etymology is different. While “biology” and “geology” are derived from Greek roots, with “bio” meaning life and “geo” meaning Earth, “technology” has Latin roots.
“Technology” comes from the combination of two Greek words: “techne,” meaning skill or art, and “logia,” meaning study or science. So, the term “technology” literally means the study or science of skills or arts. It reflects a broader concept that goes beyond the study of a specific substance (like life or the Earth) to encompass a wide range of human-made tools, systems, and techniques.
Teaser: Unexplained Aerial Phenomenon
Was talking to somebody about how I would structure the concepts around looking at UFO/UAP like the intelligence world would look at it. I started with a little taxonomy of all the possibilities that could be a UAP. A few…
Teaser: How to think about an investigation
“Cyber” is relationships and you are the SME of your relationships
When I was a professor I told my students, “Tech is easy, people are hard.” With that eye roll of yeah right, the tactical fears of learning new tech, and the forgone conclusion of 20 somethings. They took the information…
Strategic CISO or tactical CISO? Is this even the right question?
There seems to be a lot of wrangling around this topic and various articles (1, 2, 3, 4) have been written about it over time. I personally reject the concept that you are either strategic or you are tactical. During…
FireEye becomes Solarwinds
Rather than throw more ink on the evolving story of the recent breaches of two security companies. The goal of this short piece is to give actionable insight into things you can do recovering from a vendor exposure. As expected,…
Incident Response to the FireEye Tool Exposure
There will be a lot of ink spilled on this topic. My only goal with this simple write up is to provide actionable objectives. As such we’re going to start out with a few things to start out the conversation.…
Tying evidence into enterprise risk management awareness Part 2
x x x x x x x x x x x
Classifying enterprise risk and creating a taxonomy Part 1 of
An attack or exploit path can be selected through a variety of mechanisms. If you consider that the OSI 7 Layer Model is indicative of a model of network behavior (how technology of networked systems work). Then you can use…
Wild Techdom
Hi, I’m Mitchel and this is my assistant Ron. Welcome to Wild Techdom supported by Mutual of Bromaha. Today we travel to the far off wilds of the cube mazes of Silicon Valley. These are dangerous lands with an entire…
Beware the professional path. There be dragons here
So, there I was talking to some people and I talked about focus of my career not being the same as longevity in my job. You see, long before the gig economy I started moving between jobs and looking for…
Socrates and the Consensus Leader
“You’re always telling me what to do!” “You never tell me what to do!” “You’re to lazy to actually lead!” A subordinate in a stressful situation can make a lot of allegations but the root of the problem may…
Incident response: Puzzle pieces and misadventure
The blinds were drawn, a glass of water sat sweating in the humidity, and as I looked around the room some very distraught men in suits looked back at me. The middle of a Midwest summer I had just climbed…
Rosetta Stone (network protocols)
This gallery contains 1 photo →
Draft Rosetta Stone (Incident Response)
This gallery contains 1 photo →