Sublime
An inspiration engine for ideas
Architecture Defensibility : With asset inventory in hand, how well is your organization able to defend its digital assets? Does the topology of your enterprise architecture map to the current communication flows? Where are the short circuits in your communication flows? The CRQ examines the robustness of this architecture, focusing on network seg
... See moreRik Ferguson • The Cybersecurity Resilience Quotient Measuring Security Effectiveness
Mostly, they seek out vulnerabilities, detect attacks, and eliminate compromises. Of course, the size of the attack surface and the sheer volume of vulnerabilities, attacks, and compromises means organizations must make tough choices; not everything gets fixed, stopped, recovered, and so forth. There will need to be some form of acceptable (tolerab
... See moreStuart McClure • How to Measure Anything in Cybersecurity Risk
The truth is that in today’s hyperconnected world, maturity-based cybersecurity programs are no longer adequate for combatting cyberrisks. A more strategic, risk-based approach is imperative for effective and efficient risk management (Exhibit 2).
Jim Boehm • The Risk-Based Approach to Cybersecurity
Sriram Krishnan • Whimsical ideas for 2020 - Part 1
Attention Required! | Cloudflare
darkreading.com
Although such labels are helpful for grouping risk, these categories need to be decomposed one more level to get a fully qualified risk scenario that provides a greater degree of precision in the risk assessment. For instance, “Theft of data from critical applications” is a useful category, but it does not provide enough detail about what is happen
... See more