Your Money or Your Data: Ransomware Readiness Planning

September 02, 2024 | David Broggy

Hunter

The Willy Wonka World of Application Security Defenses

August 26, 2024 | David Broggy

One doesn’t have to be a magician to understand how to track the hundreds, if ...

The Bug Stops Here: Using DevSecOps Workflows for Pest-Free Applications

August 19, 2024 | David Broggy

Developers and cybersecurity have an interesting relationship. Developers have ...

The Art of Deception: Turning the Tables on Attackers with Active Defenses

August 12, 2024 | David Broggy

Once an attacker enters your network, one of their first actions will be to try ...

Sentinels of Ex Machina: Defending AI Architectures

August 05, 2024 | David Broggy

The introduction, adoption, and quick evolution of generative AI has raised ...

Knowing your Enemy: Situational Awareness in Cyber Defenses

July 29, 2024 | David Broggy

Most homeowners know that a lock is a good idea as a basic defense against ...

Cloudy with a Chance of Hackers: Protecting Critical Cloud Workloads

July 22, 2024 | David Broggy

If you've been following along with David's posts, you'll have noticed a ...

Tips for Optimizing Your Security Operations Framework

July 15, 2024 | David Broggy

Building an effective Security Operations framework that provides the right ...

The Underdog of Cybersecurity: Uncovering Hidden Value in Threat Intelligence

July 08, 2024 | David Broggy

Threat Intelligence, or just TI, is sometimes criticized for possibly being ...

Clockwork Blue: Automating Security Defenses with SOAR and AI

July 01, 2024 | David Broggy

It’s impractical to operate security operations alone, using manual human ...

Scanning the Matrix: SIEM Best Practices

June 24, 2024 | David Broggy

(A thought from The Matrix: Neo likely used a SIEM before he took the red pill ...

Secure Access Service Edge: Another Multi-Tool for the SOC

June 17, 2024 | David Broggy

Over the years, several security defense architectures have merged into a ...

The Sentinel’s Watch: Building a Security Reporting Framework

June 10, 2024 | David Broggy

Imagine being on shift as the guard of a fortress. Your job is to identify ...

Cyber Exterminators: Monitoring the Shop Floor with OT Security

June 03, 2024 | David Broggy

Pressure is increasing on manufacturers to monitor their shop floors for ...

Important Security Defenses to Help Your CISO Sleep at Night

May 20, 2024 | David Broggy

This is Part 13 in my ongoing project to cover 30 cybersecurity topics in 30 ...

How to Create the Asset Inventory You Probably Don't Have

May 13, 2024 | David Broggy

This is Part 12 in my ongoing project to cover 30 cybersecurity topics in 30 ...

Guardians of the Gateway: Identity and Access Management Best Practices

May 06, 2024 | David Broggy

This is Part 10 in my ongoing project to cover 30 cybersecurity topics in 30 ...

Protecting Zion: InfoSec Encryption Concepts and Tips

April 29, 2024 | David Broggy

This is Part 9 in my ongoing project to cover 30 cybersecurity topics in 30 ...

EDR – The Multi-Tool of Security Defenses

April 22, 2024 | David Broggy

This is Part 8 in my ongoing project to cover 30 cybersecurity topics in 30 ...

The Invisible Battleground: Essentials of EASM

April 22, 2024 | David Broggy

Know your enemy – inside and out. External Attack Surface Management tools are ...

The Secret Cipher: Modern Data Loss Prevention Solutions

April 15, 2024 | David Broggy

This is Part 7 in my ongoing project to cover 30 cybersecurity topics in 30 ...

CNAPP, CSPM, CIEM, CWPP – Oh My!

April 08, 2024 | David Broggy

We all know the cybersecurity industry loves its acronyms, but just because ...

Zero Trust Essentials

April 01, 2024 | David Broggy

This is Part 5 in my ongoing project to cover 30 cybersecurity topics in 30 ...

Evaluating Your Security Posture: Security Assessment Basics

March 25, 2024 | David Broggy

This is Part 4 in my ongoing project to cover 30 cybersecurity topics in 30 ...

Cybersecurity Documentation Essentials

March 18, 2024 | David Broggy

This is Part 3 in my ongoing project to cover 30 cybersecurity topics in 30 ...

Cost Management Tips for Cyber Admins

March 11, 2024 | David Broggy

As anyone who has filled out an expense report can tell you, cost management is ...

Cloud Architecture, Frameworks and Benchmarks

March 04, 2024 | David Broggy

At any point in your cloud security journey, you should consider practical ...

Welcome to Adventures in Cybersecurity: The Defender Series

February 26, 2024 | David Broggy

I’m happy to say I’m done chasing Microsoft certifications (AZ104/AZ500/SC100), ...