Recently, on a post celebrating a female professional earning a significant achievement within the cybersecurity field, another individual (male) commented wondering if this was due to DEI. The one...
2024-10-11 (first published: 2024-09-24)
247 reads
I’m sick of meetings and I know many other folks are, too. Every time a knowledge worker (such as IT or cybersecurity but also business) has to go to...
2024-08-23 (first published: 2024-08-09)
309 reads
Just as it's important to take care of our physical health (and I'm guilty of neglecting that), it is important to take care of our mental health, too. Also,...
2024-06-10 (first published: 2024-05-20)
278 reads
Once upon a time, I used to think of difficult technical questions to ask candidates for a DBA position. However, over time I came to understand that in most...
2024-06-07 (first published: 2024-05-14)
400 reads
I did a post last month titled RTO and RPO are myths unless you've tested recovery, but I only briefly covered what RPO and RTO are. This post goes...
2024-05-31 (first published: 2024-05-10)
447 reads
Another security fundamentals topic is authentication versus authorization. For those who have a clear understanding of the difference between the two, like with Recovery Point Objective (RPO) vs. Recovery...
2024-05-24 (first published: 2024-05-03)
276 reads
he rollback plan... what to do when things go wrong to get back to where you were before the deployment or implementation. I've seen too many cases where a...
2024-05-17 (first published: 2024-05-01)
268 reads
In information security (INFOSEC), there several foundational concepts and principles. One of the ones that’s introduced almost immediately is called the CIA triad or the Information Security Triad. While...
2024-05-13 (first published: 2024-04-26)
218 reads