People Over Policies, Pt. 6 — Awareness Over Automation

People Over Policies, Pt. 6 — Awareness Over Automation We can automate alerts.We can automate responses.But we can’t automate accountability. Every tool we add—AI, SOAR, EDR—makes us faster, smarter, more efficient.But if awareness drops, if curiosity fades, if people stop asking why… we’re not getting more secure.We’re just getting more complacent, faster. Automation should amplify […]

Read more "People Over Policies, Pt. 6 — Awareness Over Automation"

People Over Policies, Pt. 5 — When Frameworks Fail, People Don’t

People Over Policies, Pt. 5 — When Frameworks Fail, People Don’t Frameworks give us structure.But structure alone doesn’t save you when everything goes wrong. I’ve seen the best-written playbooks fall apart under pressure—Not because they were wrong,but because they couldn’t predict people. In the real world, it’s the human decisions—the quick judgment calls, the trust […]

Read more "People Over Policies, Pt. 5 — When Frameworks Fail, People Don’t"

People Over Policies, Pt. 4 — Culture Is Your Strongest Firewall

Firewalls block packets.Culture blocks complacency. You can deploy every control in the book—MFA, EDR, SIEM, SOAR—but if your people don’t care, don’t ask questions, or don’t feel safe reporting mistakes… you’ve already been breached. Over the years, I’ve learned that the strongest defense isn’t at the perimeter—it’s in the mindset of your team.It’s the engineer […]

Read more "People Over Policies, Pt. 4 — Culture Is Your Strongest Firewall"

People Over Policies, Pt. 3 — The First 24 Hours of an Incident Response

People Over Policies, Pt. 3 — The First 24 Hours of an Incident Response No policy survives first contact with an incident. When a breach, outage, or ransomware alert hits, every second counts—and every assumption gets tested.The playbooks are important, but what really matters in those first 24 hours isn’t the policy binder.It’s the people […]

Read more "People Over Policies, Pt. 3 — The First 24 Hours of an Incident Response"

How Network Isolation Saved Us: How a 2014 Compliance Requirement Became Our 2018 Ransomware Recovery Plan

The Air-gap Network That Saved Us How a 2014 Compliance Requirement Became Our 2018 Ransomware Recovery Plan In cybersecurity, you don’t always build systems for the problems you expect.Sometimes, the thing that saves you was never meant to exist for that reason at all.That’s exactly what happened to us. 2014 — A Contract, a Quake, […]

Read more "How Network Isolation Saved Us: How a 2014 Compliance Requirement Became Our 2018 Ransomware Recovery Plan"