Kevin
-
Recent Posts
- #21 Cybersecurity Leadership Shorts Log Mgt and Reducing the Noise Floor
- 20 Cybersecurity Shorts Security Operation Centers
- #19 Cybersecurity Leadership Shorts Managing the stress during a critical incident
- 18 Cybersecurity Leadership Shorts – Certifications are not the finish line
- #17 Cybersecurity Leadership Shorts Building trust
-

-

Archives
- May 2026
- January 2025
- December 2024
- October 2023
- September 2023
- July 2023
- June 2023
- May 2023
- April 2023
- February 2023
- January 2023
- July 2022
- May 2022
- April 2018
- February 2018
- June 2017
- September 2016
- March 2016
- February 2016
- December 2015
- April 2015
- February 2015
- November 2014
- October 2014
- September 2014
- March 2014
- December 2013
- October 2013
- March 2013
- November 2012
- October 2012
-
Category Archives: Uncategorized
EDPACS _ 2023 _ Kevin Lynn McLaughlin, PhD & Erik S. A. Elliott
EDPACS _ 2023 _ Kevin Lynn McLaughlin, PhD & Erik S. A. Elliott Unleashing the Power of Mobile Threat Hunting Toolkits: Why They Are Crucial in Today’s Cybersecurity Landscape “Mobile threat hunting toolkits are a crucial component of modern cybersecurity … Continue reading
CYBERSECURITY AND FUSION CENTERS
To cite this article: Kevin Lynn McLaughlin (2023): CYBERSECURITY AND FUSION CENTERS, EDPACS, DOI: 10.1080/07366981.2023.2205689 To link to this article: https://doi.org/10.1080/07366981.2023.2205689 In the ever-evolving world of cybersecurity, it is vital to streamline complexity and create accessible solutions. The establishment of … Continue reading
Posted in Uncategorized
Leave a comment
Sometimes you need a who, A what, no – a who, oh ok
It always surprises me when I meet a novice or someone who is new to a field or new to a role and they are embarrassed to ask for help. Even worse is when they are afraid that receiving feedback … Continue reading
Pollyanna Leadership?
“Positive leadership isn’t just about being optimistic, it’s about acknowledging challenges while emphasizing resilience and a can-do attitude. It empowers individuals and inspires teams to take risks, embrace change, learn from mistakes and work together to overcome obstacles. Unlike authoritarian … Continue reading
Retaining Cybersecurity Talent
. Kevin M’s Tips For Retaining Top Cybersecurity Talent As the cybersecurity threat landscape continues to evolve, it’s important to have a talented and skilled team in place to protect your organization’s assets and data. However, finding and retaining cybersecurity … Continue reading
AI and Cybersecurity
I would like to discuss the advantages and disadvantages of using AI technologies in the field of cybersecurity. On one hand, AI technologies can greatly enhance the capabilities of cybersecurity professionals in detecting and responding to security incidents. AI algorithms … Continue reading
Zero Trust
For the past few years I was puzzled by the concept of Zero Trust (ZT). I thought it was this big, nebulous thing that I just could not wrap my mind around. Every time I asked a vendor partner for … Continue reading
A Risk Approach to Cybersecurity Vulnerability Management McLaughlin, 2022
When first arriving at an organization that has not invested in a major cybersecurity program and then looking at the sheer number of computer vulnerabilities in the environment a sense of feeling overwhelmed is a common initial response. In many … Continue reading
Posted in Uncategorized
Leave a comment
Small and Medium Size Organizations at Risk
The bad guys are now starting to target mid-tier companies with their hacking activities. In many cases these companies have not yet come to realize that having a Certified Chief Information Security Officer (C|CISO) or a Virtual Cerified|CISO (vC|CISO) is … Continue reading
Posted in Uncategorized
Tagged Application Security, compliance, cyber, cyber security, Cyber Security Incident Response, Incident Response, information assurance, information security, Information Security Policy, information system security, Information Technology, ISO, IT, leadership, risk, risk assessment, risk management, Security
Leave a comment