Establishing a Mature Cybersecurity Program Through Effective Documentation

Building a robust cybersecurity program requires more than just technical prowess, it also demands a structured, comprehensive approach to documentation. A well-documented cybersecurity environment ensures that processes are consistent, repeatable, and measurable. With clear documentation, teams can work more efficiently, newcomers can get up to speed quickly, and organizations can more easily demonstrate compliance with regulations and standards. By focusing on policy, process, and runbook documentation, cybersecurity programs can move toward operational maturity. Read more

Building a Purple Team Program

Establishing a successful purple team program requires more than tools and technology. Organizations need to devote time, attention, and resources to critical considerations such as program governance, leadership, and outcomes. Establishing a strong policy, process, reporting, and accountability model will lead to a more robust and resilient program. In this article we describe some of the common challenges associated with establishing a purple team testing program. Read more

Democracy of Cybersecurity Ideas

Cybersecurity teams often require abstract approaches to complex problems in order to achieve solutions. Encouraging a democracy of ideas on the cybersecurity team is a critical approach to surfacing the best ideas and solutions. Formalizing a policy around the democracy of ideas not only supports diversity and inclusion, but also reaching business goals. Read more

Threat Intel Feeds Suck

Traditional cyber threat intelligence feeds offer incredibly limited value and reflect an outdated approach to intelligence in general. The industry needs to consider new approaches to operationally focused threat intelligence to derive true value from the investment. Read more

Ransomware Guidance

Ransomware events can be devastating to organizations. There are best practices and solid advice that can benefit response and recovery efforts. This article aims to lay out some of the strategies you can use to limit the impact of ransomware. Read more

Next Gen Blue Team

By following a four step process teams are can liberate themselves from the industry devotion to "traditional approaches" and begin to tackle, and overcome, the security challenges that matter to them. Each organization is different and using proscriptive frameworks that ignore differentiators and individuality is a recipe for failure. A team that follows this simple fours step cycle can not only ensure scale and effectiveness, they can also become transparent to leadership, stakeholders, and themselves. Read more