Posts
All the articles I've posted.
Key Considerations When Integrating a New System into an Existing Security Boundary
Published: at 07:20 PMEnsure a secure and compliant integration by addressing key considerations when introducing a new system into an existing security boundary.
A Cybersecurity Program Framework
Published: at 07:37 PMA reusable starting point for building a cybersecurity program.
The Value of a Business Impact Analysis
Published: at 10:10 AMThe risk of playing security guesswork
Responding to Events in the Cloud
Published: at 03:15 PMA practical blueprint for maintaining resilience in the cloud
AWS Geolocation Policy vs. Geoproximity Policy
Published: at 02:38 PMA quick look at two Route 53 routing policies