You May Also Enjoy
Assorted links 2025-03-09
1. Crafty Camel, a threat targeting the UAE, from Proofpoint
The more labels you have for yourself, the dumber they make you. Permalink
One of Paul Graham’s best.
Defining security outcomes
I’ve long viewed incidents as one of an organization’s very best tools for measuring everything from cybersecurity effectiveness, to overall operational maturity. Unsurprisingly, I’d also recommend using incidents to define and understand security outcomes (i.e., whether your costly security-related investments are getting the job done).
The SEC should require disclosure of cybersecurity controls
8-K filings for material cybersecurity incidents should require disclosure of all cybersecurity controls (software and services) in place when the event occurred.