There will be a lot of ink spilled on this topic. My only goal with this simple write up is to provide actionable objectives. As such we’re going to start out with a few things to start out the conversation.…
Category: Technology
The term “technology” does not follow the same linguistic pattern as “biology” and “geology” because its etymology is different. While “biology” and “geology” are derived from Greek roots, with “bio” meaning life and “geo” meaning Earth, “technology” has Latin roots.
“Technology” comes from the combination of two Greek words: “techne,” meaning skill or art, and “logia,” meaning study or science. So, the term “technology” literally means the study or science of skills or arts. It reflects a broader concept that goes beyond the study of a specific substance (like life or the Earth) to encompass a wide range of human-made tools, systems, and techniques.
Tying evidence into enterprise risk management awareness Part 2
x x x x x x x x x x x
Classifying enterprise risk and creating a taxonomy Part 1 of
An attack or exploit path can be selected through a variety of mechanisms. If you consider that the OSI 7 Layer Model is indicative of a model of network behavior (how technology of networked systems work). Then you can use…
Wild Techdom
Hi, I’m Mitchel and this is my assistant Ron. Welcome to Wild Techdom supported by Mutual of Bromaha. Today we travel to the far off wilds of the cube mazes of Silicon Valley. These are dangerous lands with an entire…
Beware the professional path. There be dragons here
So, there I was talking to some people and I talked about focus of my career not being the same as longevity in my job. You see, long before the gig economy I started moving between jobs and looking for…
Socrates and the Consensus Leader
“You’re always telling me what to do!” “You never tell me what to do!” “You’re to lazy to actually lead!” A subordinate in a stressful situation can make a lot of allegations but the root of the problem may…
Incident response: Puzzle pieces and misadventure
The blinds were drawn, a glass of water sat sweating in the humidity, and as I looked around the room some very distraught men in suits looked back at me. The middle of a Midwest summer I had just climbed…
Rosetta Stone (network protocols)
This gallery contains 1 photo →
Draft Rosetta Stone (Incident Response)
This gallery contains 1 photo →
Dungeons and Data Centers
Dungeon Master: You are standing in a brilliant lit server roomed filled with millions of dollars in sunk legacy server costs. You: Roll the dice and advance. Dungeon Master: A DevOps ghoul jumps out from behind an IBM 360 running…
Research note: Security testing through forensic resistance
Senate Intelligence Committee hearing on Russia election interference
CISO metrics: Right sizing and right costing an information security program
In the continuing attempt to prove to the wider world I’m a desirable hire as a CISO for a fortune 100 company. I offer the following and hope even if you don’t hire me that you get something of use…
CISO Hunting Tags: What threat hunting should mean to you
If you don’t have a successful information security program don’t waste your dollars or time on threat hunting until you can secure what you own first. There has been much ink spilled on threat hunting in the network. Even the…
New CISO? Get your first 90 days action items here
So you’re a new CISO and you just arrived at the organization. What should your personal interaction project plan look like? I tell CISO’s that they should plan on a few days to simply spin up their technology, get their…