From the Recorded Future Podcast: A Conversation with CISO Jason Steer About Identity Security

From my conversation with Recorded Future, two short, essential videos about identity security: how we got here, why it matters, and why it's so hard to do well.

What England’s Underwhelming Team of Football All-Stars Can Teach Us About Cybersecurity

If you want to understand the platform vs best-of-breed debate, look no further than England's football team.

Microsoft CVEs, MITRE ATT&CK, and what Secure by Design Cannot Fix

Did you know that 70% of Microsoft CVEs between 2006-2018 were memory safety bugs? How hardware Secure by Design can help...and how it can't.

How to Build a Thriving Career in Cybersecurity (and beyond)…Without Burning Out

I've learned most of these lessons the hard way. Here's 6 key things to consider.

Connect/Okta and Identity Sync Hardening

One area commonly overlooked (by defenders, but not by attackers) is identity sync infrastructure. If you harden your AD but don't do this, you are wasting your time.

G before RC

The order of the letters in "GRC" is not arbitrary. If you don't Govern your environment well, you cannot manage Risk and Compliance well. 

Integrating Threat Modeling with DevOps

Because DevOps has effectively joined the Operational and Dev domains, it introduces security dependencies which neither domain had to consider before.