Kevin
-
Recent Posts
- “Harmonizing the Digital Symphony: The Essential Role of Cybersecurity Detection Engineers in Safeguarding Cyber Landscapes”
- Cybersecurity Deception Engineers: The Unseen Guardians of Cybersecurity Programs and the Unsung Heroes in the Battle Against Cyber Threats
- Offense for Defense: The Art and Science of Cybersecurity Red Teaming
- DEFENSE IS THE BEST OFFENSE: THE EVOLVING ROLE OF CYBERSECURITY BLUE TEAMS AND THE IMPACT OF SOAR TECHNOLOGIES
- SECURING CORPORATE IoT DEVICES: CHALLENGES, STRATEGIES, AND THE ROLE OF AI AND ML IN CYBERSECURITY
Archives
-
Author Archives: mclaukl
Retaining Cybersecurity Talent
. Kevin M’s Tips For Retaining Top Cybersecurity Talent As the cybersecurity threat landscape continues to evolve, it’s important to have a talented and skilled team in place to protect your organization’s assets and data. However, finding and retaining cybersecurity … Continue reading
AI and Cybersecurity
I would like to discuss the advantages and disadvantages of using AI technologies in the field of cybersecurity. On one hand, AI technologies can greatly enhance the capabilities of cybersecurity professionals in detecting and responding to security incidents. AI algorithms … Continue reading
Zero Trust
For the past few years I was puzzled by the concept of Zero Trust (ZT). I thought it was this big, nebulous thing that I just could not wrap my mind around. Every time I asked a vendor partner for … Continue reading
A Risk Approach to Cybersecurity Vulnerability Management McLaughlin, 2022
When first arriving at an organization that has not invested in a major cybersecurity program and then looking at the sheer number of computer vulnerabilities in the environment a sense of feeling overwhelmed is a common initial response. In many … Continue reading
Posted in Uncategorized
Leave a comment
Small and Medium Size Organizations at Risk
The bad guys are now starting to target mid-tier companies with their hacking activities. In many cases these companies have not yet come to realize that having a Certified Chief Information Security Officer (C|CISO) or a Virtual Cerified|CISO (vC|CISO) is … Continue reading
Posted in Uncategorized
Tagged Application Security, compliance, cyber, cyber security, Cyber Security Incident Response, Incident Response, information assurance, information security, Information Security Policy, information system security, Information Technology, ISO, IT, leadership, risk, risk assessment, risk management, Security
Leave a comment
The Office of No, Really?
Successful ransomware attacks are at an all time high, we are losing the cyberwar, cyber criminals are making more money than ever before and it is only going to get worse, a cyber attack could be as damaging as … Continue reading
Posted in Critical Manufacturing Cyber Security, Uncategorized
Tagged Application Security, compliance, cyber, cyber security, Cyber Security Incident Response, cyber warfare, Incident Response, information assurance, information security, Information Security Policy, information system security, Information Technology, IT operations, leadership, risk, risk assessment, risk management, Security
Leave a comment
For Cyber Security the Perimeter Still Exists and Never Went Away
One item that really bugs me is to hear IT and Cyber Security professionals espouse that the perimeter is dead and that Cyber Security professionals should stop focusing on tools that protect the non-existing perimeter. I was at … Continue reading
Why Protect End User Workstations Instead of Servers First?
I have been lucky enough to spend most of my Cyber Security career doing startup operations for large companies. I thrive on the energy and passion that teams get when they are given the opportunity and support to design and … Continue reading
Cyber Security Quotes From Kevin
Our job is to enable the business to do neat stuff such as this in a secure manner : our approach is to help them design their solution in a secure way and make recommendations that allow them to … Continue reading
Posted in Uncategorized
Leave a comment