Posts
All the articles I've posted.
How to Install Chocolatey on Windows
Published: at 10:42 PMHow to get Chocolatey up and running quickly on Windows
Key Considerations When Integrating a New System into an Existing Security Boundary
Published: at 07:20 PMEnsure a secure and compliant integration by addressing key considerations when introducing a new system into an existing security boundary.
A Cybersecurity Program Framework
Published: at 07:37 PMA reusable starting point for building a cybersecurity program.
The Value of a Business Impact Analysis
Published: at 10:10 AMThe risk of playing security guesswork
Responding to Events in the Cloud
Published: at 03:15 PMA practical blueprint for maintaining resilience in the cloud