a.co/d/hXleKJH
The print version of my new book, The Book of Five Keys, just came out over the weekend, so I made the e-book version free this week.
#BookofFiveKeys
The Book of Five Keys: Ancient Strategy Reimagined for Modern Cybersecurity a.co/d/asU3wjW#Amazon via @Amazon Unlock cybersecurity strategy inspired by Musashi's timeless wisdom for the digital battlefield. Move beyond tactical tools to build a robust, resilient cybersecurity posture. #BookofFivekeys
Recently, I presented this concept at #sasummit25. This article has a lot of the data behind that presentation.
And even if you weren’t at the presentation, lots of good takeaways here!
linkedin.com/pulse/beyond-c… via @LinkedIn
Check out my latest article: Exploring AI Governance Through the Lens of OODA Principles and Asimov's Laws of Robotics linkedin.com/pulse/explorin… via @LinkedIn
Check out my latest article: Harnessing Entropy: Innovating Third-Party Risk Management in the Age of Disruption linkedin.com/pulse/harnessi… via @LinkedIn
Our Supply Chain & Nth Party Monitoring module is officially available. This first in the industry solution combines Nth-Party and high-profile cyber risk intelligence to help organizations anticipate and mitigate security incidents in their supply chains. Learn more about it here: blackkite.com/Black-Kite-Giv…
This weekend attackers made their way into into a popular compression utility, XZ-Utils. For two years, attackers worked to blend in with the community to begin making malicious strikes. @FerhatDikbiyik continues to investigate the XZ Utils incident and highlights which lessons can be drawn to safeguard against future threats in the TPRM world. Read more about the incident: blackkite.com/blog/could-tpr…