Musings

  • Cybersecurity: Functions (Part 5)

    Detect. If you are following Cybersecurity news and trends you are likely recognizing that breaches are becoming numbingly commonplace. As the SEC increases requirements on companies and states scrutinizing businesses’ practices of collecting, retaining, and protecting data the stakes are getting higher. The burden of having intelligible and actionable alerts and network visibility is growing…

  • Cybersecurity: Functions (Part 4)

    Protect. This function, protection, is perhaps the most common function associated with cybersecurity. When speaking about the CIA triad, the day-to-day functions, and the purposes of cybersecurity, the first function most people think about is the protection of identities, data, and assets. As we’ve seen in the previous posts about cybersecurity functions, there are many…

  • Cybersecurity: Functions (Part 3)

    Under NIST, to know the organization, its risk profile, threats, vulnerabilities, priorities, requirements, and capabilities, we use the function Identify.

  • Cybersecurity: Functions (Part 2)

    In this post, we’ll take a high-level pass at Cybersecurity’s Govern responsibility. Merriam-Webster dictionary includes many definitions for the word govern. In the context of Cybersecurity, the definitions are “to control, direct, or strongly influence the actions and conduct of” and “to exert a determining or guiding influence in or over.” Remembering that Cybersecurity’s key…

  • Cybersecurity Functions (Part 1)

    Recently, I was asked to detail the functions of Cybersecurity and our responsibilities. This led to me thinking, “What a wonderful prompt for a blog.” Fundamentally, cybersecurity is a practice that seeks to ensure the availability, integrity, and confidentiality of computers, electronic communications systems and services, and the information contained within. NIST SP 800-53 Rev.…

  • Git SSH – More convenient than p@ssowrd

    Howdy! Today, I’m super excited to talk about a cool and convenient way to use Git – by using SSH instead of passwords. Before we dive into that, let’s do a quick recap on what Git is and why it’s awesome. A Quick Recap on Git Git is a version control system that helps us…

  • Cybersecurity – Like the Michelin Man

    What is your viewpoint on cybersecurity? If you had to provide an analogy of cybersecurity, how would you do it? Today, I’d like to provide the analogy of cybersecurity and its relationship to business, akin to tires on a car speeding down the highway. Some may view cybersecurity as an airbag or safety restraint. These…

  • Cybersecurity: A light in a dark world

    Allowing an organization to misuse the terms creates cultural chaos for professionals and auditors.

  • Better writing on the iPad

    Technology is meant to make life better. That includes more accessibility and more efficiency. And that is where tablets come in. But tablets, with their high gloss smooth surface and stylus’ with their rubber nibs, just don’t carry the same effect as writing on paper. That is where a unique screen protector is needed. I’ve…

  • Values: Who are you?

    Who are you? What do you spend your time on? What garnishes your attention?