

Credentials, the Keys to the Kingdom
On August 30th, I was honored to be the keynote speaker at a lunch and learn event organized by Proofpoint Inc. in Palo Alto, California....

Security Convergence Resources
As technology continues to evolve and organizations become more connected, the convergence of physical and IT systems is becoming...


Reporting to Council: Why Local Governments Should Use the NIST Cybersecurity Framework
The blog post discusses how the NIST Cybersecurity Framework can be an effective tool for reporting on cybersecurity to council members.


What's in Your Software? The Importance of Supply Chain Transparency and SBOMs
In commercials, you have heard Samuel L Jackson say, "What's in your wallet?" Can you imagine him saying, "What's in your software?" I...

The Importance of the CISO
A survey by ThreatTrack demonstrates that the role of CISO is misunderstood and underappreciated by C-Level peers. It seems business...


Cybersecurity Supporting Documentation
Cybersecurity Supporting Documentation In previous posts, I outlined the required topics for cybersecurity policies and procedures. In...


Cybersecurity & IT Soft Skills
Soft Skills are important for any career in cybersecurity and information technology profession. Without the necessary you may limit...


Chaos to Control
From the way-back machine. Almost two decades ago, when I did IT services for clients, I came up with this as an information sheet for...