Value of a Risk Assessment

  I’ve always been troubled with the idea of how to provide valuable cybersecurity services without selling fear. I don’t want to be a fear monger. The answer is to sell logic. There is logic and there emotion. Often times we default to emotion when we don’t know the...

Top Cybersecurity Threats to Manufacturing Industry

  The topic of ‘risk’ and ‘threats’ can be confusing, and sometimes overwhelming for those that do not spend all their time organizing the uglies of cybersecurity. So before we jump into the biggest threats that the manufacturing industry is...

Biggest Cybersecurity Risks to Manufacturing in 2019

The cybersecurity threat landscape keeps changing. Every day there are new threats, exploits, and reports of breaches. If one thing has stayed the same it’s that the threat is real and it’s knocking on the door of corporate networks and seeing what can be...

What Does a Cybersecurity Analyst Do

  What Does a Cybersecurity Analyst Do?  For more than twenty years, I have been working as a cybersecurity Minnesota consultant in the ever-changing world of technology. Most people have some understanding of the need for cybersecurity. It is rare that much...

How to Use Metrics in Cybersecurity

“What gets measured gets managed,” the famous words from Peter Drucker. I’ve tried many ways of putting metrics around security initiatives. Some have been successful, some have been a failure, the worst have added confusion. Reporting cybersecurity...