What do recent cybersecurity graduates, career changers, and professionals with “gaps” in their resumes have in common? They need to prove that they can do the job. As a cybersecurity educator, professional, and small business leader, the last few days have been...
It’s Not If, but When: Incident Response and Data Retrieval
Three days ago, the Swiss Government Computer Emergency response team blazed a warning regarding a zero-day exploit: Log4j. It is hard to overstate just how critical this exploit is – arguably the most significant cybersecurity threat ever. On a criticality scale of...
Cast Cybersecurity Vision, Not Fear
You must cast vision for effective cybersecurity. The cybersecurity industry thrives off fear. Fear of missing out (FOMO), or fear that something deleterious will happen if you don’t act with haste, etc. Even marketing strategies appeal to a sense of fearful urgency!...
Work With What You Have: Capitalizing on Your Small Business Cybersecurity
Your small businesses exist because you believe in a vision enough to do it yourself. For startups and small businesses, success revolves around how well we utilize readily available resources and keen focus on the critical few high leverage actions. Our companies...
Cybersecurity for Small Business: Easy Protection Measures
You have seen it before: juggling multiple hats, a list that never grows smaller, a workplace small enough to feel familial but constantly slightly understaffed. That is the feeling of a small workplace, and more than likely, you work in one. 99.9% of US businesses...
Disciplined Passion for Cybersecurity
While discipline without passion is boredom, passion without discipline is chaos. Passion, driven by curiosity, is a key attribute that sets apart great cybersecurity professionals. Actually, I think it sets apart virtually anyone in their chosen field. All too often,...
Cybersecurity: Zero Trust or Intentional Trust?
Next-Gen. AI. Attack Vector. CIA Triad. Deep Learning. Each of these has one thing in common: they represent cybersecurity buzzwords. Merriam-Webster dictionary aptly defines ‘buzzword’ as “an important-sounding usually technical word or phrase often of little meaning...
The Attack on Kaseya: Déjà vu?
The start of this year’s Fourth of July holiday indicates we are not as independent or free as we should be when it comes to cybersecurity. On July 2, 2021, one of the largest supply-chain cyberattacks since SolarWinds occurred at Kaseya, an IT management software...
201: The Cyber Industry Has It Wrong…
The cybersecurity industry needs an overhaul. Cybersecurity itself is often avoided and misunderstood, because, to put it frankly, we pretend that cybersecurity is a technological problem instead of a people problem. We need to see and understand people in order to...
103: The Five Minute Cyberattack and Corporate Blind Spots
In the aftermath of the COVID-19 pandemic crisis, Amber Long is quitting her job. She weathered the tension of continued company cutbacks and survived months of remote-work isolation. Normalcy was at first distant, then seemingly closer as her company finally became...