<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.3.3">Jekyll</generator><link href="https://kwm.me/feed.xml" rel="self" type="application/atom+xml" /><link href="https://kwm.me/" rel="alternate" type="text/html" /><updated>2026-03-11T01:35:03+00:00</updated><id>https://kwm.me/feed.xml</id><title type="html">KWM</title><subtitle>Cybersecurity, technology, very likely other surprise topics along the way.</subtitle><author><name>by Keith McCammon</name></author><entry><title type="html">Assorted links 2026-02-24</title><link href="https://kwm.me/notes/assorted-links-2026-02-24/" rel="alternate" type="text/html" title="Assorted links 2026-02-24" /><published>2026-02-24T00:00:00+00:00</published><updated>2026-02-24T00:00:00+00:00</updated><id>https://kwm.me/notes/assorted-links-2026-02-24</id><content type="html" xml:base="https://kwm.me/notes/assorted-links-2026-02-24/"><![CDATA[<p>Assorted things I’ve read, watched, or listened to:</p>

<ol>
  <li>
    <p><a href="https://www.ben-evans.com/benedictevans/2026/2/19/how-will-openai-compete-nkg2x">How will OpenAI compete?</a> - “OpenAI has some big questions. It doesn’t have unique tech. It has a big user base, but with limited engagement and stickiness and no network effect. The incumbents have matched the tech and are leveraging their product and distribution. And a lot of the value and leverage will come from new experiences that haven’t been invented yet, and it can’t invent all of those itself. What’s the plan?”</p>
  </li>
  <li>
    <p><a href="https://larahogan.me/blog/be-a-thermostat-not-a-thermometer/">Be a thermostat, not a thermometer</a> - Solid life advice, disguised as employment (and management) advice.</p>
  </li>
  <li>
    <p><a href="https://steveblank.com/2026/02/24/time-to-move-on-the-reason-relationships-end/">Time to Move On – The Reason Relationships End</a></p>
  </li>
</ol>]]></content><author><name>by Keith McCammon</name></author><category term="Notes" /><summary type="html"><![CDATA[Assorted things I’ve read, watched, or listened to:]]></summary></entry><entry><title type="html">Assorted links 2026-02-23</title><link href="https://kwm.me/notes/assorted-links-2026-02-23/" rel="alternate" type="text/html" title="Assorted links 2026-02-23" /><published>2026-02-23T00:00:00+00:00</published><updated>2026-02-23T00:00:00+00:00</updated><id>https://kwm.me/notes/assorted-links-2026-02-23</id><content type="html" xml:base="https://kwm.me/notes/assorted-links-2026-02-23/"><![CDATA[<p>Assorted things I’ve read, watched, or listened to:</p>

<ol>
  <li>
    <p><a href="https://dropleaf.app/d/AlXez8scbd">AI Taxonomy: An Operational Framework for Precision in AI Discourse</a> - “AI” has become an umbrella term similar to “cloud”, and some precision is useful.</p>
  </li>
  <li>
    <p><a href="https://worksinprogress.co/issue/why-europe-doesnt-have-a-tesla/">Why Europe doesn’t have a Tesla: Europe’s cutting edge firms are falling far behind the American frontier because of restrictive labor laws</a>, and a coincidental case study <a href="https://www.coinerella.com/made-in-eu-it-was-harder-than-i-thought/">“Made in EU” - it was harder than I thought</a></p>
  </li>
  <li>
    <p><a href="https://softcurrency.substack.com/p/the-dangerous-economics-of-walk-away">The Dangerous Economics of Walk-Away Wealth in the AI Talent War: How firms are accidentally paying their best employees to become their biggest competitors</a></p>
  </li>
  <li>
    <p><a href="https://ramimac.me/floors-and-ceilings">Research ROI: Floors &amp; Ceilings</a> - As someone who believes in the importance of research, but loathes what often end up being company-sponsored science projects, this resonates.</p>
  </li>
</ol>]]></content><author><name>by Keith McCammon</name></author><category term="Notes" /><summary type="html"><![CDATA[Assorted things I’ve read, watched, or listened to:]]></summary></entry><entry><title type="html">Menu of cybersecurity risk management options</title><link href="https://kwm.me/posts/cyber-risk-management-menu/" rel="alternate" type="text/html" title="Menu of cybersecurity risk management options" /><published>2025-04-19T00:00:00+00:00</published><updated>2025-04-19T00:00:00+00:00</updated><id>https://kwm.me/posts/cyber-risk-management-menu</id><content type="html" xml:base="https://kwm.me/posts/cyber-risk-management-menu/"><![CDATA[<p><img src="https://kwm.me/assets/images/risk-management-menu.png" alt="Risk management menu" /></p>

<p>A simple visualization of risk management options, explained in the context of cybersecurity but broadly applicable.</p>

<h2 id="avoidance">Avoidance</h2>

<p>Eliminate at-risk components entirely—ideal when practical, though it rarely is.</p>

<p>A common example is credit card processing. Many organizations choose not to store or process credit card data, instead using third-party gateways. This avoids the risks, costs, and compliance burdens (e.g., PCI DSS) of handling sensitive card information internally.</p>

<h2 id="mitigation">Mitigation</h2>

<p>Manage risk exposure or impact using preventive, detective, or response controls—the most common cybersecurity approach.</p>

<p>Most cybersecurity products and services focus on mitigation. Endpoint detection and response (EDR), identity security solutions (IdPs), cloud security, security event management platforms (data lakes, SIEM), and managed security services (MSSP, MDR) all help mitigate present and emerging risks.</p>

<h2 id="transference">Transference</h2>

<p>Find someone else to actively manage the risk. You still have a risk, and transference is rarely wholesale, so a good understanding of your remaining risk is critical.</p>

<p>“Risk transference” used to be largely synonymous with “insurance.” Today, using cloud-based applications or infrastructure is one of the most common forms of cybersecurity risk transference. Availability, integrity, product security and more are shared with the vendor, allowing the customer to build upon a strong foundation. That said, widespread adoption of these technologies has also created a tremendous concentration of trust, which can have a disastrous impact if and when adversaries compromise cloud vendors.</p>

<h2 id="acceptance">Acceptance</h2>

<p>Evaluate the potential cost of a realized risk. If prevention or mitigation costs aren’t justified, explicitly accept the risk and plan accordingly. Often the least desirable option for security practitioners—though business leaders may be more willing.</p>

<p>A typical scenario involves legacy or niche applications running despite known vulnerabilities, risk of failure, or other scenarios. When mitigating or replacing such systems is too costly, risks are accepted, often supplemented by basic mitigations like isolation or enhanced disaster recovery planning.</p>]]></content><author><name>by Keith McCammon</name></author><category term="Posts" /><summary type="html"><![CDATA[]]></summary></entry><entry><title type="html">Assorted links 2025-03-19</title><link href="https://kwm.me/notes/assorted-links-2025-03-19/" rel="alternate" type="text/html" title="Assorted links 2025-03-19" /><published>2025-03-19T00:00:00+00:00</published><updated>2025-03-19T00:00:00+00:00</updated><id>https://kwm.me/notes/assorted-links-2025-03-19</id><content type="html" xml:base="https://kwm.me/notes/assorted-links-2025-03-19/"><![CDATA[<p>Assorted things I’ve read, watched, or listened to:</p>

<p>1. <a href="https://labs.sqrx.com/polymorphic-extensions-dd2310006e04">Shapeshifting Chrome extensions</a></p>

<p>2. <a href="https://citizenlab.ca/2025/03/a-first-look-at-paragons-proliferating-spyware-operations/">Comprehensive (&gt;6500 word) business and technical teardown of spyware peddler Paragon</a></p>

<p>3. <a href="https://bluemigrate.com/">Migrate your Tweets to Bluesky, preserving the original date</a> - Novel use of the <a href="https://docs.bsky.app/docs/advanced-guides/timestamps">AT Protocol’s timestamp functionality</a>, which allows backdating of posts. To avoid the appearance of shenanigans, the date and time of the Bluesky post will reflect when it was migrated, and the original date is preserved as a badge. <em>NOTE: I am never doing this</em>.</p>]]></content><author><name>by Keith McCammon</name></author><category term="Notes" /><summary type="html"><![CDATA[Assorted things I’ve read, watched, or listened to:]]></summary></entry><entry><title type="html">Assorted links 2025-03-17</title><link href="https://kwm.me/notes/assorted-links-2025-03-17/" rel="alternate" type="text/html" title="Assorted links 2025-03-17" /><published>2025-03-17T00:00:00+00:00</published><updated>2025-03-17T00:00:00+00:00</updated><id>https://kwm.me/notes/assorted-links-2025-03-17</id><content type="html" xml:base="https://kwm.me/notes/assorted-links-2025-03-17/"><![CDATA[<p>Assorted things I’ve read, watched, or listened to:</p>

<p>1. <a href="https://bindinghook.com/articles-hooked-on-trends/cyber-insurance-is-no-silver-bullet-for-cybersecurity/">Cyber insurance is no silver bullet for cybersecurity</a> - “Regulators and businesses hope cyber insurance will drive stronger security practices. In reality, a narrow focus on mitigating financial loss makes it an unreliable solution.” Risk management is grounded in losses, and cybersecurity losses in the context of insurance are explicitly financial. Also, insurance is not intended to be a silver bullet, but one of several tools used to manage risk.</p>

<p>2. <a href="https://x.com/jeremiahg/status/1888612479540044069">A simple framework for predicting where the InfoSec market is heading using cyber-insurance</a> (<a href="https://threadreaderapp.com/thread/1888612479540044069.html">Thread Reader version</a>)</p>

<p>3. <a href="https://www.reddit.com/r/cybersecurity/comments/1jaxamp/to_whom_does_your_ciso_report/">Reddit thread on CISO reporting</a></p>

<p>4. <a href="https://www.svpg.com/outcomes-are-hard/">Outcomes are hard</a></p>]]></content><author><name>by Keith McCammon</name></author><category term="Notes" /><summary type="html"><![CDATA[Assorted things I’ve read, watched, or listened to:]]></summary></entry><entry><title type="html">Assorted links 2025-03-09</title><link href="https://kwm.me/notes/assorted-links-2025-03-09/" rel="alternate" type="text/html" title="Assorted links 2025-03-09" /><published>2025-03-09T00:00:00+00:00</published><updated>2025-03-09T00:00:00+00:00</updated><id>https://kwm.me/notes/assorted-links-2025-03-09</id><content type="html" xml:base="https://kwm.me/notes/assorted-links-2025-03-09/"><![CDATA[<p>Assorted things I’ve read, watched, or listened to:</p>

<p>1. <a href="https://www.proofpoint.com/us/blog/threat-insight/call-it-what-you-want-threat-actor-delivers-highly-targeted-multistage-polyglot">Crafty Camel, a threat targeting the UAE</a></p>

<p>2. <a href="ttps://nisos.com/research/dprk-github-employment-fraud/">Another piece of the DPRK tech worker puzzle</a></p>

<p>3. <a href="https://homeland.house.gov/2025/03/06/the-defining-challenge-of-the-21st-century-hearing-evaluates-growing-ccp-threats-to-homeland-security/">“The Defining Challenge of the 21st Century”</a>, a hearing of the House Committee on Homeland Security. Not explicitly focused on cybersecurity, but cybersecurity featured prominently throughout. [<a href="https://youtu.be/oS_aZXE6W0k?t=481">Full hearing video</a>]</p>

<p>4. <a href="https://selectcommitteeontheccp.house.gov/committee-activity/hearings/media-advisory-select-committee-chinese-communist-party-holds-hearing">“End the Typhoons: How to Deter Beijing’s Cyber Actions and Enhance America’s Lackluster Cyber Defenses”</a>, a hearing of the House Select Committee on the Chinese Communist Party. Links to opening statements below. [<a href="https://youtu.be/wUZX1qLmriU?t=1844">Full hearing video</a>]</p>

<ul>
  <li>
    <p><a href="https://drive.google.com/file/d/14Msnfgmt5MdUiaX0o29t_C5JLtsP-cHn/view">Rob Joyce (former Cybersecurity Director, NSA)</a></p>
  </li>
  <li>
    <p><a href="https://drive.google.com/file/d/17uXNBlnNZWiPwnHfklX9UJUEq0zrMqcu/view">Laura Galante (former director of the Cyber Threat Intelligence Integration Center, Office of the Director of National Intelligence)</a></p>
  </li>
  <li>
    <p><a href="https://drive.google.com/file/d/14KtxoIxvztxSEAbhERXMU7qHz2FWCUwz/view">Dr. Emma Steward (Chief Power Grid Scientist, Idaho National Laboratory)</a></p>
  </li>
</ul>]]></content><author><name>by Keith McCammon</name></author><category term="Notes" /><summary type="html"><![CDATA[Assorted things I’ve read, watched, or listened to:]]></summary></entry><entry><title type="html">The more labels you have for yourself, the dumber they make you.</title><link href="https://kwm.me/links/labels/" rel="alternate" type="text/html" title="The more labels you have for yourself, the dumber they make you." /><published>2025-03-08T00:00:00+00:00</published><updated>2025-03-08T00:00:00+00:00</updated><id>https://kwm.me/links/labels</id><content type="html" xml:base="https://kwm.me/links/labels/"><![CDATA[<p>One of Paul Graham’s best.</p>

<blockquote>
  <p>If people can’t think clearly about anything that has become part of their identity, then all other things being equal, the best plan is to let as few things into your identity as possible.</p>

  <p>Most people reading this will already be fairly tolerant. But there is a step beyond thinking of yourself as x but tolerating y: not even to consider yourself an x. The more labels you have for yourself, the dumber they make you.</p>
</blockquote>]]></content><author><name>by Keith McCammon</name></author><category term="Links" /><summary type="html"><![CDATA[One of Paul Graham’s best.]]></summary></entry><entry><title type="html">Defining security outcomes</title><link href="https://kwm.me/posts/defining-security-outcomes/" rel="alternate" type="text/html" title="Defining security outcomes" /><published>2025-02-13T00:00:00+00:00</published><updated>2025-02-13T00:00:00+00:00</updated><id>https://kwm.me/posts/defining-security-outcomes</id><content type="html" xml:base="https://kwm.me/posts/defining-security-outcomes/"><![CDATA[<p>I’ve long viewed incidents as one of an organization’s very best tools for measuring everything from <a href="https://kwm.me/posts/incidents-measuring-cybersecurity-progress/">cybersecurity effectiveness</a>, to <a href="https://kwm.me/posts/incidents-an-organizational-swiss-army-knife/">overall operational maturity</a>. Unsurprisingly, I’d also recommend using incidents to define and understand security outcomes (i.e., whether your costly security-related investments are getting the job done).</p>

<p>Here are three relatively simply incident-centric cybersecurity outcomes to consider:</p>

<ul>
  <li>
    <p>The one security outcome to rule them all is the <strong>material cybersecurity incident</strong>. Although this term was popularized by the U.S. Securities and Exchange Commission, every organization—regulated or not—defines “materiality” for itself. This creates a neat, tidy, binary condition: either you have had a material cybersecurity incident or you have not.</p>
  </li>
  <li>
    <p>Beyond material incidents, <strong>incidents at-large</strong> can be categorized using organization-specific definitions or common severity, or SEV levels (e.g., SEV-1 being most severe, and SEV-2+ being increasingly less so). Using a standard SEV model, some SEV-1 incidents will be material, and all material incidents will be classified as SEV-1.</p>
  </li>
  <li>
    <p>A third outcome is <strong>cost per incident</strong>, which encompasses the expenses of technical controls, personnel, and external partners. Typically, lower-severity incidents incur lower costs, while costs rise exponentially with severity.</p>
  </li>
</ul>

<p>It’ll be easiest to implement these starting with the first: define what would constitute a material cybersecurity incident for your organization. Don’t overthink it. If it prevents you from making money, serving your customers, or both then that may be a good enough start. Once you’ve defined that and believe you’d know materiality when you see it, move on to defining incident severity level and performing <a href="https://kwm.me/posts/incidents-measuring-cybersecurity-progress/">basic incident management</a>, and then evolve your incident management process to include cost.</p>]]></content><author><name>by Keith McCammon</name></author><category term="Posts" /><summary type="html"><![CDATA[I’ve long viewed incidents as one of an organization’s very best tools for measuring everything from cybersecurity effectiveness, to overall operational maturity. Unsurprisingly, I’d also recommend using incidents to define and understand security outcomes (i.e., whether your costly security-related investments are getting the job done).]]></summary></entry><entry><title type="html">Atomic Red Team ATT&amp;amp;CK tool updated to v16.1</title><link href="https://kwm.me/notes/atomic-testing-update-16.1/" rel="alternate" type="text/html" title="Atomic Red Team ATT&amp;amp;CK tool updated to v16.1" /><published>2025-01-17T00:00:00+00:00</published><updated>2025-01-17T00:00:00+00:00</updated><id>https://kwm.me/notes/atomic-testing-update-16.1</id><content type="html" xml:base="https://kwm.me/notes/atomic-testing-update-16.1/"><![CDATA[<p>Just a quick note to point out that the <a href="https://kwm.me/posts/mitre-attack-atomic-testing-tool/">Atomic Red Team test tracking tool</a> has been updated to reflect MITRE ATT&amp;CK v16.1.</p>]]></content><author><name>by Keith McCammon</name></author><category term="Notes" /><summary type="html"><![CDATA[Just a quick note to point out that the Atomic Red Team test tracking tool has been updated to reflect MITRE ATT&amp;CK v16.1.]]></summary></entry><entry><title type="html">The SEC should require disclosure of cybersecurity controls</title><link href="https://kwm.me/notes/sec-8k-cybersecurity-control-disclosure/" rel="alternate" type="text/html" title="The SEC should require disclosure of cybersecurity controls" /><published>2025-01-17T00:00:00+00:00</published><updated>2025-01-17T00:00:00+00:00</updated><id>https://kwm.me/notes/sec-8k-cybersecurity-control-disclosure</id><content type="html" xml:base="https://kwm.me/notes/sec-8k-cybersecurity-control-disclosure/"><![CDATA[<p>8-K filings for material cybersecurity incidents should require disclosure of all cybersecurity controls (software and services) in place when the event occurred.</p>]]></content><author><name>by Keith McCammon</name></author><category term="Notes" /><summary type="html"><![CDATA[8-K filings for material cybersecurity incidents should require disclosure of all cybersecurity controls (software and services) in place when the event occurred.]]></summary></entry></feed>