Writing

Insights & Analysis

Cybersecurity, compliance, AI, and the decisions security leaders actually face.

AIComplianceCybersecurityEmail SecurityOpinionScams
ComplianceCybersecurityEmail Security

Why Your Corporate Emails Are Getting Blocked — And Who's Really to Blame (It's Not The Recipient)

Legitimate corporate emails from well-known companies are getting blocked by Spamhaus ZEN. The culprit in most cases? Google. Here's what's happening, why it's getting worse, and what your organization should do about it.

CybersecurityEmail Security

Don't Make Your Email Filter Your First Line of Defense – Why organizations keep getting phished when the fix is in the DNS

Having worked in email filtering for more than 15 years, I know that proper DNS configuration can dramatically reduce your phishing exposure. Yet most organizations still rely almost entirely on their email filter.

AICybersecurity

The Grace Period Is Over: AI Has Ended the Era of "Good Enough" Security Configurations

Hackerbot-claw ran autonomously for a week, scanned 47,000 repos, and compromised at least 6 major targets. No zero-days. No nation-state resources. Just AI and misconfiguration.

ComplianceCybersecurity

29 Minutes. That's How Long You Have. What's Your MTTD — and Do You Actually Know It?

The 2026 CrowdStrike Global Threat Report finds that the average attacker breakout time has dropped to just 29 minutes. Fastest observed: 27 seconds. Does your detection and response program reflect this reality?

CybersecurityAI

Claude Code's Remote Control Is a Developer Dream — and a Security Team's Nightmare

Anthropic's Remote Control feature for Claude Code lets developers manage AI-assisted coding sessions from their phones. It's clever engineering — and a significant enterprise security governance challenge.

CybersecurityOpinion

Claude Code Security Announcement Ruffles Investors

Cybersecurity stocks tumbled after Anthropic announced Claude Code Security. The market reaction reveals a fundamental misunderstanding of where this tool fits in the security stack.

CybersecurityScams

Does "Open to Work" Really Mean "Open to Being Scammed?"

Setting my LinkedIn profile to Open to Work immediately attracted scammers targeting job seekers. Here's what I encountered and what to watch for.

ComplianceCybersecurity

Policies, Procedures, and Standards – Why They Are Needed and Their Impact on Corporate Security

As organizations grow, the absence of formal policies, procedures, and standards creates compounding security and operational risk. Here's why these documents matter — and what happens when organizations skip them.

Cybersecurity

Security Faux Pas – Owning Up When You Make A Mistake

Even the best security programs experience incidents. What separates resilient organizations from vulnerable ones isn't perfection — it's how employees respond when something goes wrong.

Compliance

Understanding the Value of a SOC 2 Report (Service Organization Controls)

SOC 1, SOC 2, SOC 3 — the terminology gets muddy fast. Here's how to understand the differences and why a SOC 2 Type 2 report signals genuine security maturity.

Cybersecurity

Getting a Grip on Your Personal Online Security

Three major data breaches to start 2024 prompted me to audit my own online accounts. Here's the process I used — and why forgotten accounts are a bigger risk than most people realize.

Cybersecurity

What Is Security & How Much is Enough?

Cybersecurity dominates our lives, yet most organizations still struggle to answer the most fundamental question: how much security is actually enough? The answer depends on risk, not compliance.

Cybersecurity

Importance of Separating Corporate and Personal Identities and Devices

The Target breach started with a contractor checking personal email on a corporate device. The DNC hack exploited a personal Gmail account accessed from a work machine. Separating your identities isn't optional — it's foundational.

Cybersecurity

Developing a Security-First Mindset

Security awareness isn't built through annual training. It's built the same way any habit is — through repeated exposure until the right behaviors become automatic.

ComplianceCybersecurity

Importance of Asset Management in Organizational Security

You cannot protect what you don't know exists. Asset management is the foundation of every security and compliance program — here's why it matters and how to think about it.

Cybersecurity

The Importance of Personal & Corporate Cybersecurity Hygiene

Just as we maintain physical hygiene to stay healthy, cybersecurity hygiene keeps our devices and data secure. Here are the key practices everyone should have in place.

ComplianceCybersecurity

Proper Password Management

Password reuse is one of the most exploited weaknesses in both personal and corporate security. Here's how passwords work, why reuse is dangerous, and what to do about it.

Opinion

Twitter's Last Days?

The post-Musk acquisition hysteria on Twitter is more theater than substance. Here's a more pragmatic take on what the ownership change actually means.