Saved by Chad Hudson
Cybersecurity Rules of Thumb
The truth is that in today’s hyperconnected world, maturity-based cybersecurity programs are no longer adequate for combatting cyberrisks. A more strategic, risk-based approach is imperative for effective and efficient risk management (Exhibit 2).
Jim Boehm • The Risk-Based Approach to Cybersecurity
- How something appears to you may not be how it is.
- What is said or shown may not be all there is.
- What is true for me may not be true for you.
- The same words may mean different things to different people.
- What people say may not be what they mean. Because comms is lossy and language is me
Packy McCormick • visakan veerasamy on Substack

The answer, I believe, lies in fostering a strong cybersecurity culture within organisations. It’s not enough to simply implement technical solutions and hope for the best; we must fundamentally change the way we think about and approach cybersecurity. This means embedding security into every aspect of an organisation’s operations, from the boardro
... See morej4vv4d • Protecting People, Not Just Data
Mostly, they seek out vulnerabilities, detect attacks, and eliminate compromises. Of course, the size of the attack surface and the sheer volume of vulnerabilities, attacks, and compromises means organizations must make tough choices; not everything gets fixed, stopped, recovered, and so forth. There will need to be some form of acceptable (tolerab
... See moreStuart McClure • How to Measure Anything in Cybersecurity Risk
Let's keep in mind the words of Deputy Chairman Victor Zhora: "Resilience stems first from basic cyber hygiene." By prioritizing cybersecurity, planning for crises, and creatively reducing risk, we can build a more resilient future.