CyberWeekly
Subscribe
Sign in
Home
Archive
About
New
Top
Discussion
Cyberweekly #139 - APTs, Why does it always have to be APTs?
Welcome to CyberWeekly, a weekly roundup of news, articles, long form blog posts and various other miscellania that interests your author, Michael…
Michael Brunton-Spall
Mar 7, 2021
2
Share this post
Cyberweekly #139 - APTs, Why does it always have to be APTs?
cyberweekly.substack.com
Copy link
Twitter
Facebook
Email
Cyberweekly #148 - Reading for fun and profit
It's a short newsletter this week because I've pulled together some absolutely amazing long reads for you, as well as a couple of typical news features…
Michael Brunton-Spall
May 9, 2021
1
Share this post
Cyberweekly #148 - Reading for fun and profit
cyberweekly.substack.com
Copy link
Twitter
Facebook
Email
Cyberweekly #171 - Managing your risk from vendors
We’re going to hear a lot about supply chains over the next few years. This is going to be the next big thing in security, and luckily, lots of smart…
Michael Brunton-Spall
Oct 17, 2021
3
1
Share this post
Cyberweekly #171 - Managing your risk from vendors
cyberweekly.substack.com
Copy link
Twitter
Facebook
Email
Cyberweekly #200 - Issue 200
I can't really believe that I've managed to write 200 of these, and that people continue to subscribe week after week. This has been a somewhat…
Michael Brunton-Spall
Jun 26
2
Share this post
Cyberweekly #200 - Issue 200
cyberweekly.substack.com
Copy link
Twitter
Facebook
Email
Cyberweekly #163 - Passing on knowledge
We're bad as an industry at passing on knowledge. Much of the digital transformation of the last 10 years was a repeat, or reapplication of the agile…
Michael Brunton-Spall
Aug 22, 2021
3
Share this post
Cyberweekly #163 - Passing on knowledge
cyberweekly.substack.com
Copy link
Twitter
Facebook
Email
Cyberweekly #179 - Managing a wide ranging and long running incident
Happy new year! I said last year that I'd take a break for Christmas, and then a fairly major incident broke, and I spent a number of hours writing the…
Michael Brunton-Spall
Jan 9
2
Share this post
Cyberweekly #179 - Managing a wide ranging and long running incident
cyberweekly.substack.com
Copy link
Twitter
Facebook
Email
Cyberweekly #196 - Knowing when you are compromised, and doing something about it
“Just log more” is the advice that we see most often from cybersecurity defenders and cyber talking heads (which reminds me of Max Headroom). But…
Michael Brunton-Spall
May 22
2
Share this post
Cyberweekly #196 - Knowing when you are compromised, and doing something about it
cyberweekly.substack.com
Copy link
Twitter
Facebook
Email
Cyberweekly #190 - It's not zero trust, it's moving trust
Zero trust is the architecture we talk about where there is zero trust in the fact that the requests are "coming from inside the network". But in fact…
Michael Brunton-Spall
Mar 27
2
Share this post
Cyberweekly #190 - It's not zero trust, it's moving trust
cyberweekly.substack.com
Copy link
Twitter
Facebook
Email
Cyberweekly #198 - Controlling access to the things that matter
Identity and Access Control forms the basis of almost all security as we know it. It doesn't matter whether we are talking about using passes to enter a…
Michael Brunton-Spall
Jun 12
1
Share this post
Cyberweekly #198 - Controlling access to the things that matter
cyberweekly.substack.com
Copy link
Twitter
Facebook
Email
Cyberweekly #130 - Solarwinds Special
Welcome to CyberWeekly, a weekly roundup of news, articles, long form blog posts and various other miscellania that interests your author, Michael…
Michael Brunton-Spall
Dec 20, 2020
Share this post
Cyberweekly #130 - Solarwinds Special
cyberweekly.substack.com
Copy link
Twitter
Facebook
Email
Cyberweekly #199 - Learning by doing
How do we learn stuff? There's a lot of different theories about how people learn. One of my teacher friends always gets quite frustrated at the common…
Michael Brunton-Spall
Jun 19
1
Share this post
Cyberweekly #199 - Learning by doing
cyberweekly.substack.com
Copy link
Twitter
Facebook
Email
Cyberweekly #181 - Cyber Command and Control
If we assume for a minute that you aren't perfect, that somehow, an adversary has gotten onto one of your users endpoints. What happens next? The…
Michael Brunton-Spall
Jan 23
1
Share this post
Cyberweekly #181 - Cyber Command and Control
cyberweekly.substack.com
Copy link
Twitter
Facebook
Email
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts