Why “False Positive” Is Failing Us“False positive” might be the most abused term in security operations. It gets tossed around in war rooms, in detection tuning sessions, in…2d ago2d ago
Least Privilege is Dead. Zero Standing Access is HereFor years, I’ve watched security teams chase the elusive “least privilege” ideal. It’s etched into every framework, audit, and playbook…3d ago3d ago
The Second System Effect: Caveats in Software EngineeringEvery software engineer has been there: staring at a codebase they’ve maintained for months or years, feeling a mixture of pride and…Oct 25, 2024Oct 25, 2024
AI Slop: The Digital Pollution of Our TimeIn the wake of recent natural disasters, a new threat has emerged alongside the physical destruction: AI Slop. This term, rapidly gaining…Oct 14, 2024A response icon1Oct 14, 2024A response icon1
Establishing an Acceptable Use Policy for AIA Step-by-Step Guide to Crafting an Effective AI Usage PolicyAug 31, 2024Aug 31, 2024
Shared Responsibility of Security Controls: Battling Account Takeovers TogetherIn our hyperconnected world, online services are woven into the tapestry of our daily lives. But with great convenience comes great assumed…Jan 16, 2024A response icon1Jan 16, 2024A response icon1
Biden’s National Cybersecurity Strategy will hold Software Companies liable for defectsIt has been nearly two weeks since the Office of the National Cyber Director has released a National Cybersecurity Strategy grouped into…Mar 14, 2023Mar 14, 2023
Account Takeover (ATO) Maturity ModelThe introduction of a financial fraud maturity model allowing organizations to assess preventative capabilities of an account takeover. The…Feb 14, 2023Feb 14, 2023
Hello World!Another introduction to the cybersecurity community and a commitment to explore the journalist collective we now know as Medium.Mar 29, 2022Mar 29, 2022