OUR DEEP THOUGHTS

Blog Posts Worth Sharing

Cybersecurity Incident: Who’s Telling Your Story?

Again? The recurring victim. So you’ve either had a bad day or are just diligently preparing to have one. The situation is that a data breach has occurred and, for all the preparation, no one really thought to go deep on just what the response to the world would...
Read More

Additional blog posts

Samples of what we would ghostwrite for our clients.

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Cybersecurity Incident: Who’s Telling Your Story?

Again? The recurring victim. So you’ve either had a bad day or are just diligently preparing to have one. The situation is that a data breach has occurred and, for all the preparation, no one really thought to go deep on just what the response to the world would...

Cloud Security is Coming – In Waves!

Imagine a man standing in the shallows of the beach, the ocean ahead. The wind is picking up, bringing higher and higher waves, all while the tide rushes in. But he stands firm, relenting to none of it. Is he Neo? Is he living inside “The Matrix”, about to...

Choose your [Information Security] Platforms Wisely

Let’s talk about platforms, shall we? It’s hard to have any discussion with any IT vendor and not have them say “platform” at least once. Many will say it so many times you have to wonder if they even know what it is they are talking about...

Your’e Not an Infosec Commodity – Your’e Inimitable

Standing before 100+ information security leaders at a conference and pointing out that every single on of them, myself included, are commodity resources is going to get attention. Wait! What did he just say! I’m a “commodity”? Yes. Yes you are! If...

Great InfoSec Leaders Have Your Back

One of the more remarkable things that seems to have become trendy is bashing those with infosec certifications. With great regularity, I see Twitter and LinkedIn posts by other infosec professionals, many of whom I follow, actually poking fun at CISSPs and other...

A True Partner Will Help You Get The Right Price

Ahhh…all those security “partners” and self-professed “trusted advisors” out there. Who are they, really? What are they all about these days? Is price the only thing that matters? If you are like me, you have probably associated these as...

The Myth of the Value Added Reseller (VAR)

The legacy information security Value Added Resellers (VARs) are really struggling with showing their true value. And that’s a really good thing. Let’s explore where they are failing…and why. And, of course, why their market correction will...

Are You Agile Enough for The Cloud?

Believe it or not, I have actually seen even large and otherwise sophisticated IT departments fail at moving security to the cloud. At first, it doesn’t even compute. The cloud is supposed to be easier. It’s supposed to be more agile. It’s supposed...

Improving the Security Situation – That’s the Mission

There are two situations that constantly leave me a bit awestruck in the world of information security consulting. And after reading this, especially as a “customer”, I’m betting you will agree. But before I jump right into what those two are,...

The NIST Cybersecurity Framework and You

When you see these lyrics, what comes to mind? Five hundred twenty-five thousand Six hundred minutes How do you measure – measure a year? Hopefully you recognize it as a truly great Broadway hit musical song (from the play Rent), especially since it has been...

IF YOU ARE ONLY HALF WAY INTO CLOUD SECURITY. (10 of 10)

From the “Top 10 Signs Your Network and Security Design Might Be Far Behind” Series Half pregnant. Half secure. Just about anything that is “half” is probably not a good thing. And that certainly holds true with cloud security. But I get it....

IF YOU ARE HIDING BEHIND DEPRECIATION. (9 of 10)

From the “Top 10 Signs Your Network and Security Design Might Be Far Behind” Series It’s time for an insider tip for all those out there who haven’t spent tons of time working sales as a security appliance vendor. When a prospect says to the...

IF YOU AREN’T TRYING TO IMPRESS YOUR CFO (7 of 10)

From the “Top 10 Signs Your Network and Security Design Might Be Far Behind” Series Setting your CFO (or equivalent for those privately held companies) is perhaps the #1 thing we can do to set everyone up for success. Even if it’s not an absolute #1,...