Newsletter Archive
-
ISSUE 13 | When Approved Doesn’t Mean Safe
Read more: ISSUE 13 | When Approved Doesn’t Mean SafeIssue #13 • Week of March 25, 2026 Sponsored message Security Tip of the Week 🔐 Treat Certifications as Starting Points, Not Endpoints When a vendor hands you a FedRAMP authorization, SOC 2 report, or ISO 27001 certificate, ask one follow-up question: what did the review not cover? Every certification has scope exclusions, known gaps,…
-
ISSUE 12 | Your Tools Are the Attack Surface Now
Read more: ISSUE 12 | Your Tools Are the Attack Surface NowIssue #12 • Week of March 23, 2026 Sponsored message Security Tip of the Week 🔐 Treat Your Security Tools Like Production Assets Your firewall management console, SIEM, and PAM vault are high-value targets, not background utilities. Audit who has admin access to each, confirm those accounts are covered by MFA and privileged session monitoring,…
-
ISSUE 11 | Your security stack is the attack surface
Read more: ISSUE 11 | Your security stack is the attack surfaceIssue #11 • Week of March 9, 2026 Sponsored message Security Tip of the Week 🔐 Audit the Service Accounts Your Security Devices Hold Pull the service accounts your firewalls, SD-WAN controllers, and edge devices use to integrate with Active Directory. Check what permissions those accounts have and when they were last reviewed. Most were…
-
ISSUE 10 | Your security program is built on things you stopped verifying
Read more: ISSUE 10 | Your security program is built on things you stopped verifyingIssue #10 • Week of March 9, 2026 Sponsored message Security Tip of the Week 🔐 Verify, Don’t Assume Audit one security control this week that your team treats as “handled” but hasn’t formally reviewed in over a year: a firewall rule, a trust boundary, an access policy. Assumptions are where security debt hides longest.…
-
ISSUE 09 | Three years inside your network – Nobody noticed
Read more: ISSUE 09 | Three years inside your network – Nobody noticedIssue #09 • Week of March 2, 2026 — Sponsored message Security Tip of the Week 🔐 Your IR Plan Assumes Things That May No Longer Be True Pick one external dependency in your incident response plan, a federal contact, a vendor SLA, a coordinated escalation path, and verify it still works as written. Plans…
-
ISSUE 08 | The Trust You Forgot You Granted
Read more: ISSUE 08 | The Trust You Forgot You GrantedIssue #08 • Week of Feb 23, 2026 Sponsored message Security Tip of the Week 🔐 Trust Inventory, Not Just Asset Inventory Most asset inventories track what you own. Few track what implicitly trusts what. This week, pick one approved third-party integration in your environment and ask whether the trust it was granted at approval…
-
ISSUE 07 | SecurityConscience: Patched ≠ Clean
Read more: ISSUE 07 | SecurityConscience: Patched ≠ CleanIssue #07 • Week of Feb 16, 2026 Sponsored message Security Tip of the Week 🔐 Patch ≠ Eviction Validation Pick one system patched for a previously exploited vulnerability in the last 12 months. Check whether your logging captured what normal operation looked like before the patch, and whether you’d detect if the original exploit…
-
ISSUE 06 | What We Assume Is Safe
Read more: ISSUE 06 | What We Assume Is SafeIssue #06 • Week of Feb 9, 2026 Sponsored message Security Tip of the Week 🔐 NTLM Reality Check Enable enhanced NTLM auditing in Windows 11 24H2 or Server 2025 and let it run for 48 hours. If you see authentication attempts from systems you don’t recognize or to services you thought were Kerberos-only, your…
-
ISSUE 05 | The Risk You Didn’t Mean to Keep
Read more: ISSUE 05 | The Risk You Didn’t Mean to KeepThe attack surface is not growing because of what you added this quarter. It is growing because of what you never fully removed, never fully mapped, and never fully governed. If you have spent the last week in an architecture review, an identity roadmap conversation, or an M&A due diligence call, you already know this…
-
ISSUE 04 | When Trust Boundaries Break
Read more: ISSUE 04 | When Trust Boundaries BreakSecurity Conscience: Enterprise Cyber Weekly Issue #04 • Week of Jan 19, 2026 Sponsored message Security Tip of the Week 🔐 Monitor Your Security Tools Like Production SystemsTreat SIEMs, IAM platforms, firewalls, and other security infrastructure as high-value attack targets by enforcing independent monitoring, strict segmentation, and external visibility into their behavior. If a security…
