It's said you can't step into the same river twice, and oysters create layers of beauty encapsulating threat. Lessons from both in the growth of individuals and organisations.
Evaluations such as risk are partially built on external threat assessments, regarded as intelligence. Understanding what intel is, what it can do, and what it cannot is foundational to recognise the spectrum of offerings. The following synopsis of intel from a cyber perspective starts a whole new line of inquiry.
Creating and maintaining a team in remote environment is challenging. Finding leaders who can adapt to circumstances we've had over the last year to effectively build disparate teams and missions, even more so. In establishing mutual trust to work as teams, we must find remote camaraderie - helping people belong when there is no meeting space.
Louie Armstrong references aside, this post is a bit of a departure from the others. There is no BLUF, OpRes, or cyber. Instead it illustrates the world from a stoic (Marcus Aurelius/ Epictetus/ Seneca) philosophical standpoint. Your world.
Bad actors' use of phishing in many forms to gain access is common. Phishing used against people with vision-related disabilities using assistive technology requires further conversations and considerations.
Organisational inclusion of individuals requiring assistive technology potentially incurs and assumes cyber risks for both parties. Care and consideration must be taken to protect the assistive technology user and the integrating organisation's environment.
Cyber is commonly seen by businesses as a cost center. Changes are afoot that suggest it is increasingly a revenue generator. There are great gains in client relationships to be made if organizations that are not vendors of these services think in a similar way about offering value from their cyber teams' work.
A GIS-style layered approach gives control to correlating data sets. Building layers with questions and considerations aides in making certain the picture we see is accurate. Permissions and transparency are crucial aspects in determining who else has visibility, and helps shifting culture within an organisation. Layer the knowns and unknowns are identified, possibly reduced.
Creating Enduring Ontologies -
With tax season approaching, two shifts in ransomware tactics combined could have more effect than previously seen – targeting of organizations rather than individuals and publishing rather than destroying the victim’s internal data. A dangerous combination, the incorporation of both tactics could force victims to pay the ransom if we are lucky, with impacts from lack of payment potentially severely damaging clients in ways more personal than previously seen. -scl