Security Cloud Courses About

Tagged With 'Culture Change'

<< More tags

imgs/thumbnail.webp
Parler Pas: Fringe Social Network Offline

Parler gets deplatformed and can’t find any organizations that want to work with it. It’s about time.

imgs/thumbnail.webp
The Help Desk Is a Key to Incident Response

Outages are hard to handle. There’s pressure to get things back up and running, to avoid damage to your reputation, and to avoid getting yelled …

imgs/thumbnail.webp
The New Office: Home?

Is working from home the new normal in tech? Is working from home as simple as ensuring a strong internet connection and access to the right tools? …

imgs/thumbnail.webp
The Unicorn Project Through a Security Lens

The Unicorn Project is the latest book from Gene Kim, one of the leaders of the DevOps movement. The book focuses on developer enablement and culture. …

imgs/thumbnail.webp
Business Email Compromise

Cybercriminals don’t always use complicated technical attacks to get around your cybersecurity. Sometimes—probably more often than we care to …

imgs/thumbnail.webp
AppSec Is Dead

Is application security (AppSec) dead? Did it every really work? Let’s discuss…

imgs/thumbnail.webp
Cybersecurity Time Crunch

The Fortnite developer teams at Epic Games are working in a perpetual “crunch time” situation. That’s not sustainable by any …

imgs/thumbnail.webp
Perfectionism In Tech

It’s tempting to search for the perfect solution to a problem. The challenge? That “perfection” rarely exists. But time after time, …

imgs/thumbnail.webp
Communication At Scale

When you are trying to get a message out to a lot of people, it’s not realistic to try and get them all back to you digital properties. So what …

imgs/thumbnail.webp
The War Room

During a large incident response, bringing everyone together to a “war room” can be the difference in a speedy recovery, but there are …

imgs/thumbnail.webp
Are We Setup to Fail?

Criminals are winning the battle against security practitioners. Need proof? Look no further than the new headlines in any given week.

Billions of …

imgs/thumbnail.webp
Security Is A Quality Issue

Security is a quality issue. Except we don’t treat it that way and that’s costing us dearly.

imgs/thumbnail.webp
Operational Security

Connecting with others is critical but it can also pose a risk. It’s important not to “leak” information needlessly. This is a …

imgs/thumbnail.webp
Learning From Failure

No one wins all the time. Don’t seek out failure but we shouldn’t be afraid of sharing our failures so that others may learn.

imgs/thumbnail.webp
Constant Negative Pressure

You cannot stand at “Red Alert” 24/7 but that’s exactly what we do in cybersecurity…often without realizing it. What impact …

imgs/thumbnail.webp
Document, Automate, Repeat

If you’re working by hand, you’re failing. In today’s world of security, rapid delivery, and new technologies, automation is …

imgs/thumbnail.webp
Working Together To Improve Security

There’s only upside to collaborating more deeply with other teams in the org. So why doesn’t the security get out there and do it?!?

imgs/thumbnail.webp
Security Thinking Is Service Design Thinking

We’ve spoken a lot of maintaining and expanding perspective when it comes to cybersecurity. In this episode, we dive in highlight a methodology …

imgs/thumbnail.webp
Culture Change Is Hard

We (the IT community) don’t push for cultural change because it requires persistent and dedicated long term work. That runs counter to the usual …

imgs/thumbnail.webp
Why Can't Security Place Nice With Others?

Is it just attitude that keeps security teams from working well with the rest of the organization? And if so, can that attitude be changed? …

imgs/thumbnail.webp
OpSec, Soft Skills, And People

Most of the focus around cybersecurity education is on the technical aspects. Is that the right approach?

imgs/thumbnail.webp
Listening To Customers

Listening to customers is built into the DNA of a lot of organizations…why aren’t security teams doing the same?

imgs/thumbnail.webp
F**king Passwords

Passwords are the worst. Just the worst.

imgs/thumbnail.webp
Password Health

Passwords are the best of a mountain of bad solutions. Picking a strong password lies at the intersection of math (yay!) and …

imgs/thumbnail.webp
The Security Team's Role In Your Org

Can new technology solve everything? We in the security community need to spend more time investing in people and process.

imgs/thumbnail.webp
Fear Uncertainty And Doubt

Cybersecurity is often positioned from the negative. There are bad things coming to get you! What a waste of energy…

imgs/thumbnail.webp
Organizational Design and OT Risk

Sometimes the digital world has an impact on the real world…and it’s not always a positive one.

imgs/thumbnail.webp
Secure Systems Thinking

One of the biggest challenges in cybersecurity today is the tendency to secure components instead of the larger system. It’s understandable but …

imgs/thumbnail.webp
Passwords, Educatiing Users, and the Communal Good

Security awareness is next to useless. Educate users instead

imgs/thumbnail.webp
Risk Assessments & The Risk Of No Data

Good data drives good decisions. This is a major problem in cybersecurity where the data simply isn’t available or accurate.