PinnedMessage in a BottleWhy the SEC’s recent legal complaint against SolarWinds has made good Cyber Security Risk Management significantly harderJan 11Jan 11
PinnedThe Seven Rules of Success in Artificial IntelligenceYou need best-in-class natural intelligence to get the most out of artificial intelligence.Jun 9, 2023Jun 9, 2023
PinnedWhy the World Needs a Software Bill Of Materials Now“Sunburst” was the most sophisticated hack the world has ever seen. One of the most urgent lessons so far learned from the attack: we need…Mar 14, 20211Mar 14, 20211
The Humble CISO 2023On the last day of 2023, the overall assessment of the year may be that it has been a humbling experience. Again.Dec 31, 2023Dec 31, 2023
Governance of low-code application developmentFive key strategies for the successful democratization of business app creationMar 18, 2023Mar 18, 2023
The Humble CISO, 2022Last year, on December 31, I sat down and thought about the past year in cybersecurity. Then, looking at the devastating supply chain…Dec 30, 2022Dec 30, 2022
The Value of People in CybersecurityThe destructive nature of Taylorism in Cybersecurity managementSep 27, 20221Sep 27, 20221
Apple and The Cryptrickery FactoryDoes Apple’s proposed content scanning technology turn iPhones and Mac computers into “compliance assistants” that save us from data-hungry…Jan 4, 2022Jan 4, 2022
The Humble CISO 2023If 2021 has taught us a few lessons, then the one I would like to stress on this last day of the year is that we will do a much better job…Dec 31, 2021Dec 31, 2021
Why we need a normalized scale for attacker sophisticationIt has been a particularly bad quarter for cyber security; the first attack where a supply chain attack was combined with spreading…Sep 21, 2021Sep 21, 2021