- Risk Management The Contagious Smell of Fear in Cybersecurity
Security decisions are affected by factors beyond rational analysis—choice fatigue, sleep deprivation, and anxiety. Research shows fear can spread through scent; women who smelled "fearful sweat"...
- Assessments Cheat Sheet for Creating Security Assessment Reports
There's surprisingly little online guidance about creating good security assessment reports. This one-page cheat sheet covers the general approach, data analysis, methodology documentation, scope...
- Social Networking Security Implications of the "Web" Becoming the "Social Web"
The web is becoming the social web—instant communication, public archives, mobile access, weak relationships. Security implications: business interactions occur outside corporate networks, data leaks...
- Assessments Write a Strong Executive Summary for Your Security Assessment Report
Most readers only see the executive summary, so put key takeaways there. Make it understandable to non-technical executives, connect findings to business relevance like risks and compliance, keep it...
- Incident Response The Critical Role of the Security Incident Response Coordinator
The incident response coordinator is the linchpin of IR efforts—tracking progress, coordinating team members, providing status updates, and channeling expertise. The ideal candidate knows IT, has...
- Assessments 6 Qualities of a Good Information Security Assessment Report
Good security assessment reports start with strong executive summaries for non-technical readers, provide meaningful analysis beyond tool output, include supporting figures, describe methodology and...