Category Archives: InfoSec

Software Bill of Material and Vulnerability Management Blind Spots

Open source software is everywhere (which is not a bad thing in itself). However, many buyers don’t have inventory of open source components included in software products they are buying. Business even fail in keeping tack of open source components … Continue reading

Posted in InfoSec, Open Source | Tagged , | Comments Off on Software Bill of Material and Vulnerability Management Blind Spots

Podcast: CISO MindMap and Recommendations for 2022-23

Recently we recorded a podcast with CISO Tradecraft focusing on CISO MindMap 2022 and recommendations for 2022-23. As a reference the latest CISO MindMap is available here and detailed recommendations page is also available here. You can listen to the … Continue reading

Posted in InfoSec, Leadership, SOC | Tagged , , , , | Comments Off on Podcast: CISO MindMap and Recommendations for 2022-23

Essential Business Knowledge for InfoSec Professionals

June 18, 2022 – By Rafeeq Rehman The role of InfoSec professionals has morphed into a critical business function. One should expect getting involved in “business” discussion often, and at increasing higher levels of business structure up to board of … Continue reading

Posted in InfoSec, Leadership | Tagged , , | Comments Off on Essential Business Knowledge for InfoSec Professionals

CISO MindMap 2022 – Recommendations

I have included six specific recommendations with the recent publication of CISO MindMap. This article is to further elaborate on these recommendations, why these matter, and what actions information security leaders can take. The objective of this article is to … Continue reading

Posted in cisomindmap, InfoSec | Tagged , , , | Comments Off on CISO MindMap 2022 – Recommendations

What is Service Mesh and Why Should Anybody Care?

There is a lot going on with Cloud computing, containers and micro services. Following is a summary of what information security professionals need to know about one very important idea: the Service Mesh. What is it? Service Mesh controls, monitors, … Continue reading

Posted in InfoSec | Tagged , , | Comments Off on What is Service Mesh and Why Should Anybody Care?

PDF Version of Book: Cybersecurity Arm Wrestling available for download

The PDF version of my latest book “Cybersecurity Arm Wrestling – Winning the perpetual fight against crime by building a modern Security Operations Center (SOC)” is now available for download. You can share this link, print it, and use it … Continue reading

Posted in Education, InfoSec, SOC | Tagged , , | Comments Off on PDF Version of Book: Cybersecurity Arm Wrestling available for download

Perspectives on Information Security Architecture

There are few things that every architect should do but most forget. As you know, there is no shortage of technology architecture frameworks and standards. You may have come across TOGAF for enterprise architecture and SABSA (Sherwood Applied Business Security … Continue reading

Posted in InfoSec | Tagged , | Comments Off on Perspectives on Information Security Architecture

Six Essential Ingredients for Building a Successful Security Operations Center (SOC)

Over years of my professional work and research, I found six ingredients absolutely necessary for success of any SOC, big or small. When you combine these ingredients with continuous improvement activities, you will get excellent business results. On the other … Continue reading

Posted in InfoSec, SOC | Tagged , , , | Comments Off on Six Essential Ingredients for Building a Successful Security Operations Center (SOC)

Achieving Excellence in SOC Operations and Incident Response

Draft of Chapter 7 of my book “Cybersecurity Arm Wrestling – Winning the perpetual fight against crime by building a modern Security Operations Center” is complete and available for download. This chapter is about “Operate” part of the “Plan-Design-Build-Operate” strategy and … Continue reading

Posted in InfoSec, SOC | Tagged , , , | Comments Off on Achieving Excellence in SOC Operations and Incident Response