Border Security to Border-less Security

With the unprecedented move to telecommuting in the last week for many industries, it is critical for security teams to understand that many traditional security measures become difficult for the organization to maintain, thus needing a different mindset. The idea of maintaining border security on your organization’s central network is changing to the need to …

DoD now requiring minimum cyber security controls from its contractors.

Department of Defense is now requiring contractors to meet a standard level of cyber security protection.  The “Capability Domains” seems to be a mix of the various standard controls that the IT Security profession has been promoting for years (ie. CIS top 20). I can definitely see this as a requirement that gets adopted by …

The “Cyber Workforce: Do we have an employee shortage, or an employer shortage?

“The U.S. will have as many as 3.5 million unfilled cybersecurity jobs by 2021.” I received that sentence in an email yesterday. I was curious to where these numbers come from? How do you calculate this sort of shortage? I understand it was intent to be a ‘shock and awe’ type of message, but I …

Incident Response: Command Line Log Redaction

During a recent incident response, it was necessary to take a very large text file (70,000 lines, about 25,000 printed pages), query and redact information to pass to the incident response team. With some command line processing I was able to redact personal identifiers (MAC address, and Username) except for the ones in question. I …

NIST Privacy Framework

NIST has released a preliminary draft if their Privacy Framework…. Important snippets from the article about the focus of the framework: – the importance of collaboration between privacy and cybersecurity teams. – it’s important to build a tool that is usable regardless of an organization’s structure. https://www.nist.gov/blogs/cybersecurity-insights/preliminary-draft-nist-privacy-framework-here

The Art of the CISO: What comes first, the attack or security?

This afternoon I had a great conversation with a colleague about securing servers. He specifically asked what we need to do to ‘Secure’ them? My first question was “How are they being attacked?” Which led to a good conversation, and a discussion on the philosophy of securing computers and networks. It is very easy to …