I was shuffling through the seventh K of a five K training run, because math and masochism...
Cybersecurity and DFIR
Professionalism is one of those words that gets tossed around casually, but its meaning shifts depending on...
Have you ever sat in a business meeting with senior leaders and thought, “I’ve fallen into an...
The browser is more than just an app on desktop or mobile devices. For many organizations, it...
Understanding the Broken Vendor-CISO Relationship The relationship between CISOs and vendors often feels like a constant tug...
Every year, organizations spend huge amounts on security awareness programs. The marketing message is always the same:...
Vendors keep saying they can end alert fatigue. That they can solve false positives. That their SIEM...
Let’s get one thing clear before the polite-speak kicks in: putting your CISO under the CIO is...
I’ve walked this path before. When Cisco acquired Splunk, I was a CISO managing a complex environment...
Introduction: The NASCAR Security Problem Some leaders and tech folks are glaringly tone deaf to walking into...
What problem are we actually solving by shifting security left? That is not a rhetorical question. It...
Welcome to the tech world, where your hoodie matters more than your resume, your youth is considered...
You’ve been hit by CVE 2025 53770, and your execs are already asking how this could happen....
There is a new exploit and what the heck am I going to do now? If you...
Introduction: The Myth of the “Client List” and the Messy Truth For years now, people have obsessed...