Culture Change

Latest

The Help Desk Is a Key to Incident Response
Archive ·

The Help Desk Is a Key to Incident Response

Outages are hard to handle. There's pressure to get things back up and running, to avoid damage to your reputation, and to avoid getting yelled at by the boss. The Help Desk is often the best positioned team to help...and the most overlooked.

The New Office: Home?
Archive ·

The New Office: Home?

Is working from home the new normal in tech? Is working from home as simple as ensuring a strong internet connection and access to the right tools? This is an issue with a ton of impacts outside of just the relationships on your team. This post highlights various conversations and points of view on

The Unicorn Project Through a Security Lens
Archive ·

The Unicorn Project Through a Security Lens

The Unicorn Project is the latest book from Gene Kim, one of the leaders of the DevOps movement. The book focuses on developer enablement and culture. What does this have to do with cloud security? Everything.

Business Email Compromise
Archive ·

Business Email Compromise

Cybercriminals don't always use complicated technical attacks to get around your cybersecurity. Sometimes—probably more often than we care to admit—it's the really simple stuff that works and what's simpler than an email?

AppSec Is Dead
Archive ·

AppSec Is Dead

Is application security (AppSec) dead? Did it every really work? Let's discuss...

Cybersecurity Time Crunch
Archive ·

Cybersecurity Time Crunch

The Fortnite developer teams at Epic Games are working in a perpetual "crunch time" situation. That's not sustainable by any measure...and from all reports, things are bad over at Epic.

Perfectionism In Tech
Archive ·

Perfectionism In Tech

It's tempting to search for the "perfect" solution to a problem. The challenge? That "perfection" rarely exists. But time after time, we seek out these perfect solutions. Nothing's perfect. Security is far from perfect. But we keep trying for perfect sceurity&

Communication At Scale
Archive ·

Communication At Scale

When you are trying to get a message out to a lot of people, it's not realistic to try and get them all back to you digital properties. So what do you do? How do you manage trying to hold the same conversations in multiple places? How do you monitor what's working?

The War Room
Archive ·

The War Room

During a large incident response, bringing everyone together to a "war room" can be the difference in a speedy recovery, but there are downsides as well. The biggest? Fatigue & burnout. How do you monitor and handle that?

Are We Setup to Fail?
Archive ·

Are We Setup to Fail?

Criminals are winning the battle against security practitioners. Need proof? Look no further than the new headlines in any given week.