Profile cover photo
Profile photo
Matt Johnston
37 followers
37 followers
About
Posts

Post has attachment
Still Managing False Positives?
Still Managing False Positives? As an Operations Analyst, there are few things more frustrating (aside from not having the resources you need to do your job), than being inundated with inaccurate information. When inaccurate information comes in the form of...
Add a comment...

Post has attachment
But the Red Team!
It's happened to me a few times now, and if you operate or have had an audit performed by a third party Red Team, I'm sure it's happened to you. Every time I hear the phrase, "but the Red Team..." I want to...well...respond like this: It goes something like...
But the Red Team!
But the Red Team!
securitydisclosures.blogspot.com
Add a comment...

Post has attachment
It's Time to Compete in Information Security
One of the recurring messages I hear from family and friends when I talk to them about information security is, "this is a really big problem, so how do we help people understand, and how do we fix it?" In considering this question, I've also been consideri...
Add a comment...

Post has attachment
The SOC - Why We Get It Wrong
The SOC topic is often controversial, with some championing that SOCs are the ONLY way to go, while some criticizing that SOCs are purely show pieces with no real value relative to the mission they purport to execute. I've live through that controversy all ...
Add a comment...

Post has attachment
How CISOs Are Really Measured
Modern CISOs have one of the toughest, most stressful jobs in the world. There are far more risks to businesses today, then there were ten years ago, and many of these new and evolving risks come from the cyber world. Business risks used to be largely limit...
Add a comment...

Post has attachment
Should You Build a SOC?
There is a section of consultants and educators in the cybersecurity industry, who proclaim that the litmus test for having a mature information security program is revealed by the presence and maturity of a dedicated, in-house Security Operations Center. T...
Add a comment...

Post has attachment
Embarrassing Emails - Can We Secure This?
I was recently asked to provide some thoughts on the subject of the unauthorized access and disclosure of personal email used by national leaders. Specifically referring to the email issues surrounding Hilary Clinton, Colin Powell, and John Podesta, I was a...
Add a comment...

Post has attachment
Challenges Facing CISOs
I was recently asked to comment on what I believe are the biggest challenges facing the CISO or CSO as we venture closer to 2017. This past year was one where ransomware clearly dominated the early headlines, followed by email security and the ramifications...
Add a comment...

Post has attachment
What Matters to Small Businesses
Premise Ever since entering the cyber security industry in 2000, I have often wondered about the small to medium business market. Essentially individuals handling sensitive data at extremely small scale who are concerned only with business sustainability at...
What Matters to Small Businesses
What Matters to Small Businesses
securitydisclosures.blogspot.com
Add a comment...

Post has attachment
Amazing Security at Small Business Prices
Having invested over 13 years in the Managed Security Services Provider (MSSP) space, I had the privilege of having insights into the top InfoSec companies in the world. In my later years as a strategic solutions developer many of my discussions with busine...
Amazing Security at Small Business Prices
Amazing Security at Small Business Prices
securitydisclosures.blogspot.com
Add a comment...
Wait while more posts are being loaded