top of page


SWAG Security Analysis
Here in Israel there were two security breaches that made big headlines over the last couple weeks. The first was a an ongoing ransomware...
Stanislaw Banaszak
13 gru 20202 minut(y) czytania


DORA the (Threat Led) Explorer
As financial firms become more digital, the EU decided these firms need to focus on ensuring their operations are as cyber resilient as...
Stanislaw Banaszak
4 gru 20202 minut(y) czytania


When a Zero Day is Old News
This week Microsoft released a zero day patch for an unpatched local privilege escalation (LPE) vulnerability affecting all Windows 7 and...
Stanislaw Banaszak
29 lis 20202 minut(y) czytania


Outcome based Cyber Security
Donald Rumsfeld was the US Secretary of Defense from 1975-1977 and once answered a security question using the terms known knowns, known...
Stanislaw Banaszak
22 lis 20202 minut(y) czytania


Trump, Biden and CVSS
Businesses use predictive metrics all the time. For example, forecasting next quarter’s revenue is a predictive metric used widely in...
Stanislaw Banaszak
14 lis 20202 minut(y) czytania


Digital Security: CISO, TISO, BISO, BASE
First a little history. CIOs in the 80s and early 90s were focused on the technical side of the job. They would tend to have a technical...
Stanislaw Banaszak
1 lis 20202 minut(y) czytania


Security in Numbers
Security (or Safety) in numbers is the hypothesis that, by being part of a large physical group or mass, an individual is less likely to...
Stanislaw Banaszak
25 paź 20202 minut(y) czytania


Cybersecurity and Continuous Improvement
The busy folks at NIST have just released the official version of NISTIR 8286 Integrating Cybersecurity and Enterprise Risk Management...
Stanislaw Banaszak
17 paź 20202 minut(y) czytania


Protecting Airspace, WLAN, Wireless and WiFi – Oh My
The interest in protecting organizational wireless networks is growing and so are the number of guidelines, best practices and standards...
Stanislaw Banaszak
11 paź 20202 minut(y) czytania


800-53 Revision 5 – Outcome Based Security and Privacy Control
NIST released Special Publication 800-53 Revision 5 earlier this month. In my mind it is actually different enough from previous releases...
Stanislaw Banaszak
5 paź 20202 minut(y) czytania


Wireless Red Teams: Evil Twins, Eavesdropping, and Password Cracking
Many companies operate wireless networks to allow greater flexibility through mobile computing. In many cases IT departments deploy...
Stanislaw Banaszak
21 wrz 20202 minut(y) czytania


Red, White and Blue Make Purple
Vulnerability scanning, penetration testing and red teams are the main detective controls for residual cyber risk – i.e. the risk that...
Stanislaw Banaszak
7 wrz 20201 minut(y) czytania


Red, White and Blue Cybersecurity Risks
Cybersecurity is moving away from using threats, vulnerabilities and exploits as the management metaphor towards risk-based cybersecurity...
Stanislaw Banaszak
26 sie 20202 minut(y) czytania


Lack of Standard Metrics
Lack of standard metrics to measure, manage and benchmark cyber risk limits security efficiency and effectiveness, making it difficult to...
Stanislaw Banaszak
16 lip 20201 minut(y) czytania


Fragmented technologies
Organizations’ cyber security stack consist of 100-150 different disconnected point tools or technologies making it difficult to assess...
Stanislaw Banaszak
17 cze 20202 minut(y) czytania


Constantly Shifting Business Needs
In today’s modern world business needs are constantly shifting, IT and cyber risk landscape require a constant stream of attention and...
Stanislaw Banaszak
15 cze 20201 minut(y) czytania


Is Cyber Security Fit-to-Purpose?
ITIL (IT Infrastructure Library) is a set of detailed practices for IT service management (ITSM) that focuses on aligning IT services...
Stanislaw Banaszak
20 paź 20192 minut(y) czytania


Cyber security: Emphasize Protect or Detect?
I am a subscriber to the NIST cyber security framework school of thought. Even though it is officially called the “Framework for...
Stanislaw Banaszak
18 paź 20192 minut(y) czytania


Measuring the Value of Cyber Security
A value-driven approach to cyber security would help businesses understand where to spend their cyber security budget, and how much to...
Stanislaw Banaszak
12 paź 20192 minut(y) czytania


Visibility, Analytics, Policies and Control are the Lynchpin of Cyber Security
Visibility is context. Analytics combine context with events. Policy translates that into a ”plan of action implemented by controls....
Stanislaw Banaszak
22 wrz 20192 minut(y) czytania
bottom of page