Welcome to CyberWeekly, a weekly roundup of news, articles, long form blog posts and various other miscellania that interests your author, Michael…
2
It's a short newsletter this week because I've pulled together some absolutely amazing long reads for you, as well as a couple of typical news features…
1
We’re going to hear a lot about supply chains over the next few years. This is going to be the next big thing in security, and luckily, lots of smart…
3
1
I can't really believe that I've managed to write 200 of these, and that people continue to subscribe week after week. This has been a somewhat…
2
We're bad as an industry at passing on knowledge. Much of the digital transformation of the last 10 years was a repeat, or reapplication of the agile…
3
Happy new year! I said last year that I'd take a break for Christmas, and then a fairly major incident broke, and I spent a number of hours writing the…
2
“Just log more” is the advice that we see most often from cybersecurity defenders and cyber talking heads (which reminds me of Max Headroom). But…
2
Zero trust is the architecture we talk about where there is zero trust in the fact that the requests are "coming from inside the network". But in fact…
2
Identity and Access Control forms the basis of almost all security as we know it. It doesn't matter whether we are talking about using passes to enter a…
1
Welcome to CyberWeekly, a weekly roundup of news, articles, long form blog posts and various other miscellania that interests your author, Michael…
How do we learn stuff? There's a lot of different theories about how people learn. One of my teacher friends always gets quite frustrated at the common…
1
If we assume for a minute that you aren't perfect, that somehow, an adversary has gotten onto one of your users endpoints. What happens next? The…
1