Sublime
An inspiration engine for ideas

Architecture Defensibility : With asset inventory in hand, how well is your organization able to defend its digital assets? Does the topology of your enterprise architecture map to the current communication flows? Where are the short circuits in your communication flows? The CRQ examines the robustness of this architecture, focusing on network seg
... See moreRik Ferguson • The Cybersecurity Resilience Quotient Measuring Security Effectiveness
Establishing connections became a problem. All Maersk's computers and servers had crashed, so email and the company's internal chat system were down. To his surprise, Andy also found that the contacts on employees' phones had been wiped clean, because they were configured to fetch contacts from online servers, which had now been deleted. The Maiden
... See moreMikko Hyppönen • If It's Smart, It's Vulnerable

The truth is that in today’s hyperconnected world, maturity-based cybersecurity programs are no longer adequate for combatting cyberrisks. A more strategic, risk-based approach is imperative for effective and efficient risk management (Exhibit 2).