Sublime
An inspiration engine for ideas

Architecture Defensibility : With asset inventory in hand, how well is your organization able to defend its digital assets? Does the topology of your enterprise architecture map to the current communication flows? Where are the short circuits in your communication flows? The CRQ examines the robustness of this architecture, focusing on network seg
... See moreRik Ferguson • The Cybersecurity Resilience Quotient Measuring Security Effectiveness

Yesterday, I tried to find out where the Deepseek servers are located, but I couldn't because they are Cloudflare-protected. Just now, someone randomly sent me a link to: "CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications"

The truth is that in today’s hyperconnected world, maturity-based cybersecurity programs are no longer adequate for combatting cyberrisks. A more strategic, risk-based approach is imperative for effective and efficient risk management (Exhibit 2).