blog.blackswansecurity.com
Management | Black Swan Security
http://blog.blackswansecurity.com/category/mgmt
A blog about cybersecurity. Archive for the ‘Management’ Category. Not so basic but definitely essential. Monday, April 3rd, 2017. IT Maintenance (patching, replacing end-of-life platforms, inventories, baseline builds etc),. Network security (internal segmentation),. Access Management (efficient joiners, movers, leavers processes, privileged user management). Security Monitoring (effective visibility),. Incident Response (tested plans, exercised staff). Monday, January 23rd, 2017. Lord Kelvin, 1824-1907.
blog.blackswansecurity.com
analytics | Black Swan Security
http://blog.blackswansecurity.com/tag/analytics
A blog about cybersecurity. Posts Tagged ‘analytics’. Security Analytics Beyond Cyber. Sunday, January 4th, 2015. I presented at 44con. 2014 on moving security analytics on from network defense and rapid response towards supporting data-driven and evidence-driven security management, my presentation is on slideshare below:. Security Analytics Beyond Cyber. Security Analysis for Humans. Tuesday, December 9th, 2014. I was inspired to consider some guiding principles for conducting security analysis. SOC Va...
blog.blackswansecurity.com
architecture | Black Swan Security
http://blog.blackswansecurity.com/tag/architecture-2
A blog about cybersecurity. Posts Tagged ‘architecture’. The security opportunity in Digital. Friday, September 16th, 2016. Four years ago I discussed. Measuring Black Boxes, part one. Monday, November 2nd, 2015. Due to the scale and complexity of many of the systems I have worked with a large part of the process has been to decompose a system and measure and characterise it’s components. This allows me to identify high risk areas of the system to focus my efforts. We need to talk about IT. It has long b...
blog.blackswansecurity.com
Analytics | Black Swan Security
http://blog.blackswansecurity.com/category/analytics-2
A blog about cybersecurity. Archive for the ‘Analytics’ Category. Pitfalls of Cyber Data. Friday, May 15th, 2015. I jointly presented with Ernest Li at 44con Cyber Security on April 28th 2015 discussing how we use public cyber data and some of the problems we have run into. My presentation is on slideshare below:. Pitfalls of Cyber Data. Security Analytics Beyond Cyber. Sunday, January 4th, 2015. I presented at 44con. Security Analytics Beyond Cyber. Security Analysis for Humans. Monday, March 10th, 2014.
blog.blackswansecurity.com
big data | Black Swan Security
http://blog.blackswansecurity.com/tag/big-data
A blog about cybersecurity. Posts Tagged ‘big data’. Security Analytics Beyond Cyber. Sunday, January 4th, 2015. I presented at 44con. 2014 on moving security analytics on from network defense and rapid response towards supporting data-driven and evidence-driven security management, my presentation is on slideshare below:. Security Analytics Beyond Cyber. Big Data Security Analytics Paper. Monday, March 10th, 2014. Considerations for developing Big Data Security Analytics: A Practical Guide. Anton Chuvak...
blog.blackswansecurity.com
Architecture | Black Swan Security
http://blog.blackswansecurity.com/category/arch
A blog about cybersecurity. Archive for the ‘Architecture’ Category. The security opportunity in Digital. Friday, September 16th, 2016. Four years ago I discussed. SOC Value Chain & Delivery Models. Thursday, January 21st, 2016. To dig into this we developed a Wardley map. Mapping the value chain and evolution of SOC components. Wardley maps look complicated but are effectively a tool for discussion in front of a white board to identify dependencies and the maturity of components and services. (C...I hav...
blog.blackswansecurity.com
27001 | Black Swan Security
http://blog.blackswansecurity.com/tag/27001
A blog about cybersecurity. Posts Tagged ‘27001’. Alignment vs Compliance vs Certification. Wednesday, July 4th, 2012. I have had a series of conversations recently where the concepts of alignment, compliance and certification of ISO 27001 were very confused. Certification was seen as horribly costly and alignment was held out as a good enough goal that was entirely achievable. Not so basic but definitely essential. The security opportunity in Digital. Cyber Resilience: Part Six Recommended Reading.
blog.blackswansecurity.com
Other | Black Swan Security
http://blog.blackswansecurity.com/category/other
A blog about cybersecurity. Archive for the ‘Other’ Category. Tuesday, March 31st, 2015. A couple of months ago I was home ill from work and frankly a little bored. The combination of a fast moving technology team, the startup culture and the positive results of just good security communications and engagement was that a written policy seemed anachronistic and almost fossilised. I posted the following provocative, somewhat tongue in cheek, but honest question:. Wednesday, March 28th, 2012. As a result we...
blog.blackswansecurity.com
Testing | Black Swan Security
http://blog.blackswansecurity.com/category/test-2
A blog about cybersecurity. Archive for the ‘Testing’ Category. Making sense of pen testing, part two. Thursday, May 31st, 2012. This is the second in a series of posts looking at the current state of pen testing as I see it and presenting some ideas for the future. Part one is available here. In the next post I start exploring why these problems exist and how they might be improved. What is wrong with pentesting? Too much focus on 0day as a measure of success. Making sense of pen testing, part one.