Keep up to date

Infosec moves fast, stay up to date

We release a weekly newsletter recapping what we're seeing as vCISOs. We touch on security news, the state of work, and more!

Thank you! Keep an eye on your inbox for updates.
Oops! Something went wrong while submitting the form.
November 13, 2020

What IS Zero Trust?

If you believe that firewalls, VPNs, and Anti-Virus are enough to keep your company and data secure, then this article is for you!

Learn more
January 15, 2020

5 Things To Know Before Phishing Your Employees

There are things to consider before sending out a phishing test. This article is a simple guide on what to know beforehand.

Learn more
January 8, 2020

How to Schedule a Penetration Test Like a BOSS

A guide for those looking to schedule their first pentest AND get the most return on investment for the money from time spent on it.

Learn more
February 28, 2019

What To Look For In A Cloud Friendly SIEM

Whether you are a SIEM vendor or not, looking for a SIEM vendor, these are tips to help you make a good and informed decision.

Learn more
October 28, 2018

You Just Got An AWS Security Audit… Now What?

After running a security audit on your AWS accounts, you found some issues and want to prohibit unauthorized access.

Learn more
September 12, 2021

Ticketmaster Hack – Perfect Example

How Did The Ticketmaster Hack Happen? It’s a perfect example of multiple security failures.

Learn more
March 12, 2021

Security Questions To Ask Your Cloud Engineering Team (Cheatsheet)

Leaders are often confident that their engineers follow security best practices, but here are some security questions to consider.

Learn more
January 11, 2021

Threat Modeling: Protecting Yourself Before You Get Attacked

It might be difficult to safeguard your data after it’s been compromised, but you can protect yourself next time with threat modeling.

Learn more
January 4, 2021

5 Things NOT To Do With Bug Bounties

We’ve put together a quick list of things NOT to do when working with a security researcher in an official or unofficial bug bounties.

Learn more
November 13, 2020

What IS Zero Trust?

If you believe that firewalls, VPNs, and Anti-Virus are enough to keep your company and data secure, then this article is for you!

Learn more
November 4, 2020

JWT Token Security and Best Practices

After doing some research on JWT Security and Best Practices, I made a collection of the best resources and readings.

Learn more
October 9, 2020

3 Campaigns for Cybersecurity Awareness Month

Hosting a cybersecurity awareness campaign can showcase your team, raise awareness of infosec, and display how your company is doing that.

Learn more
July 21, 2020

5 Cybersecurity Lessons Learned From The Recent Twitter Hack

Here are 5 cybersecurity lessons learned from the recent Twitter Hack; use these lessons to prevent or minimize an attack on your systems.

Learn more
July 7, 2020

How Do I Structure Files For An Audit?

It might seem challenging to set up an easy, shareable audit folder structure, but we break it down here in a few easy steps here.

Learn more
June 22, 2020

How To Set Up AWS Organizations For Success

A HOW-TO on how to set up your AWS Organization properly to allow you to deploy services and controls across your AWS Accounts.

Learn more
June 17, 2020

AWS Security Tools That Support AWS Organizations

Finally, AWS has noticed and made it easier to deploy these services either centrally from the master account, or even better using a delegated administrator account, such as a dedicated AWS Security Account.

Learn more
April 2, 2020

Zoom Security – What To Do?

I am getting a lot of questions from clients right now regarding the secure use of Zoom. It may be hard to filter the signal from the noise…

Learn more
March 24, 2020

Advisory: Windows 0-Day, Actively Exploited, No Patch Available

There is a vulnerability affecting all versions of Windows with no available patch from Microsoft, but have several workarounds.

Learn more
January 28, 2020

Why Are Shared Passwords Bad?

You might know that sharing passwords is a bad idea, but do you know why? In this article, I will walk you through the various problems.

Learn more
January 15, 2020

5 Things To Know Before Phishing Your Employees

There are things to consider before sending out a phishing test. This article is a simple guide on what to know beforehand.

Learn more
January 8, 2020

How to Schedule a Penetration Test Like a BOSS

A guide for those looking to schedule their first pentest AND get the most return on investment for the money from time spent on it.

Learn more
July 1, 2019

AWS Re:Inforce 2019 Summary

AWS (Amazon Web Services) had its first conference focused on Cloud Security. Below is a list of new releases and videos.

Learn more
June 10, 2019

Using AWS Service Control Policies To Protect All Your AWS Accounts

AWS SCP is a maturing AWS Organization feature that allows you to apply IAM-like policies at the organizational level.

Learn more
May 29, 2019

AWS Secrets Manager, CLI, and JQ

AWS Secrets Manager provides a way to securely store and retrieve secrets. I test it, and what if an application was using the secret.

Learn more
February 28, 2019

What To Look For In A Cloud Friendly SIEM

Whether you are a SIEM vendor or not, looking for a SIEM vendor, these are tips to help you make a good and informed decision.

Learn more
January 10, 2019

How Replacing My Roof Mirrored Information Security – Part 4

Part 4 in a series of articles that relates information security to replacing and constructing a shingle based roof (take it step by step!).

Learn more
December 27, 2018

How Replacing My Roof Mirrored Information Security – Part 3

Part 3 of a series that relates information security to replacing and constructing a shingle based roof (you need to measure more than once)!

Learn more
December 10, 2018

How Replacing My Roof Mirrored Information Security – Part 2

Part 2 of a series of articles that relates information security to replacing and constructing a shingle based roof to fill in gaps Based on real-life!

Learn more
November 27, 2018

How Replacing My Roof Mirrored Information Security – Part 1

Part 1 of a series of articles that relates information security to replacing and constructing a shingle based roof. Based on real-life!

Learn more
October 28, 2018

You Just Got An AWS Security Audit… Now What?

After running a security audit on your AWS accounts, you found some issues and want to prohibit unauthorized access.

Learn more
June 28, 2018

A Case of Mistaken Identity and 5 Steps to Prevent It

I found a strange user in my account with admin rights that I did not recognize! As you can imagine, this triggered all my alarms.

Learn more
May 28, 2018

Why Is Cloud Security So Hard? (Hint: It’s Not)

Securing a new environment without knowing the rules of the road can be hard. Take the time to learn the rules and avoid speedbumps.

Learn more
September 20, 2021

The Nocebo Effect of Security

Even good security can sometimes become an anti-pattern, just add complacency.

Read More
September 12, 2021

Security and Emotional Validation

Information Security is about relationships and understanding.

Read More
September 6, 2021

Decision Making In Information Security, A Preface

Our brains are big prediction engines. Sometimes this is good, sometimes this is bad.

Read More
August 29, 2021

4 Cybersecurity Lessons From Replacing My Roof

A couple summers ago I fully replaced the roof of my shed. Here are my reflections on cybersecurity from that experience.

Read More
Read more on LastWeekAsAvCISO.com