Posting this at 09:45AM ET - any updates will be noted. I've been thinking and discussing this a lot the last few days. I am cautiously optimistic and we should be able to confirm or disprove many of the claims in short order, but I try to get too excited in either direction…. That’s usually … Continue reading Early thoughts on the Mythos Report
Wisconsin Bankers Association 2025 Security Officers Workshop | Navigating Zero Trust: Building Your Strategy and Roadmap
We need a new security model that more effectively adapts to the complexity of the modern environment, embraces the hybrid workplace, and protects people, devices, apps, and data wherever they’re located. In other words, we need to modernize our approach to cybersecurity. Zero Trust as “a cybersecurity strategy premised on the idea that no user … Continue reading Wisconsin Bankers Association 2025 Security Officers Workshop | Navigating Zero Trust: Building Your Strategy and Roadmap
ICBA Live 2025: The Future of Cybersecurity in Banking: Technological Innovations Ahead
The Future of Cybersecurity in Banking: Technological Innovations Ahead: How AI, Zero Trust, and Next-Gen Security Strategies are Reshaping Financial Institutions In an era where digital transformation is paramount, ensuring robust cybersecurity is crucial for the future of banking. This session will delve into the technological innovations that prioritize security while enhancing operational efficiency and … Continue reading ICBA Live 2025: The Future of Cybersecurity in Banking: Technological Innovations Ahead
Book Review: Cybersecurity Tabletop Exercises: From Planning to Execution
By Robert Lelewski, John Hollenberger I design and facilitate many incident response tabletop exercises (TTX) at work. When I saw this book announced by no starch press, I had to jump on the pre-sale. This was an easy read. I read and marked it up during a single flight. It is a resource that anyone charged … Continue reading Book Review: Cybersecurity Tabletop Exercises: From Planning to Execution
Navigating Cloud Security: Challenges and Solutions
The expanding reliance on cloud infrastructure introduces various security risks that traditional perimeter-based strategies cannot adequately address. Misconfigurations, poorly managed IAM, third-party vulnerabilities, insider threats, and new attack types like DoS and cryptojacking complicate security. Adopting a Zero Trust model, automation, and continuous monitoring are essential for improving cloud security posture.