What is Meant by “Integrity” in the CIA Triad?

This is the third part of a four-part blog series covering the CIA Triad. The first part discussed the CIA triad as a whole (Part I). Part II covered Confidentiality. Part IV will cover Availability. Integrity. Many people hear or see that word and their first thought is of an individual’s trustworthiness. Do they have …

Understanding “Confidentiality” Within the CIA Triad

This is the second part of a four-part blog series covering the CIA Triad. The first part discussed the CIA triad as a whole (Part I). Part II will cover Confidentiality with parts III and IV covering Integrity and Availability. Three can keep a secret, if two of them are dead. Benjamin Franklin, Poor Richards …

Rebranding “InfoSec” as “Business Security”

“No one really gets what it is we do.” I read and hear that phrase, or something similar, a lot when consuming InfoSec (information security) content. There are references and allusions to it on Social Media, write-ups in industry periodicals, and references to it on podcasts. The arguments tend to be the same. “It’s not …

Just get involved

So you’re starting out in InfoSec and don’t know where to start. I don’t mean the trainings, or the fields of study, the webinars, or the cons. We aren’t talking about doing your research to publish, or diving in on bug bounty research, or how to conquer your first CTF (capture the flag). Nor are …

How Being an Imposter Helped Me Crack My Imposter Syndrome Cycle

It was little over five years ago that I created a Twitter account. I had worked in security for about five years at that time and read every journal I could, any blog I could find. My goal was to share news, information, and takes, and to build my “professional” brand. I was angling to …