Tag

Zero Trust

Understand the Zero Trust security model, which operates on the principle of never trust, always verify. Posts cover Zero Trust architecture, identity verification, micro-segmentation, least-privilege access, and practical steps for implementing Zero Trust frameworks across enterprise environments.

posts

Third Party Risk

Third Party Vendor Cybersecurity Risk: A 2026 Guide

When Target lost 40 million credit card records in 2013, the attackers didn't breach Target directly. They compromised an HVAC vendor. Over a decade later, the playbook hasn't changed — it's just gotten more devastating. Third party vendor cybersecurity risk is now the single fastest-growing

Carl B. Johnson Apr 07, 2026 6 min read
Securing Employee Mobile Devices

Securing Employee Mobile Devices: A Practical Guide

In 2023, Verizon's Data Breach Investigations Report found that 74% of all breaches involved the human element — and mobile devices have become the primary attack surface for exploiting that weakness. I've watched organizations spend six figures on perimeter defenses while their employees check corporate email on

Carl B. Johnson Apr 07, 2026 6 min read
Cybersecurity Terms Explained

Cybersecurity Terms Explained: A Practical Guide

Last year, a hospital administrator told me she ignored an alert about a credential stuffing attack because she didn't know what that phrase meant. Three days later, her organization was dealing with a ransomware incident that shut down patient scheduling for two weeks. The jargon gap in cybersecurity

Carl B. Johnson Mar 31, 2026 5 min read
NIST Cybersecurity Framework

NIST Cybersecurity Framework: A Practical Guide for 2026

The Framework 83% of Organizations Claim to Follow — But Few Actually Implement When the City of Dallas was hit by a devastating ransomware attack in May 2023, investigations revealed systemic gaps in risk management, incident response, and access controls — the exact areas the NIST Cybersecurity Framework was designed to address.

Carl B. Johnson Mar 28, 2026 6 min read
Cybersecurity Terms Explained

Cybersecurity Terms Explained: A No-Nonsense Guide

During a breach investigation last year, I watched a CFO stare blankly at an incident response report and ask, "What's lateral movement? What does 'exfiltration' mean? Can someone just speak English?" That moment crystallized something I've known for two decades: the cybersecurity

Carl B. Johnson Mar 28, 2026 6 min read
Cybersecurity Terms Explained

Cybersecurity Terms Explained: A No-Nonsense Guide

In May 2021, Colonial Pipeline paid a $4.4 million ransom after a single compromised password shut down fuel delivery across the U.S. East Coast. The post-incident reporting was filled with jargon — ransomware, threat actor, credential theft, attack vector — that left most non-technical readers glazing over. Here's

Carl B. Johnson Sep 16, 2021 7 min read
Computer Security Security

Computer Security Security: Layers That Actually Work

The Colonial Pipeline Just Proved Your Security Needs Security On May 7, 2021, a single compromised password shut down 5,500 miles of fuel pipeline. Colonial Pipeline paid a $4.4 million ransom within hours. The attack didn't exploit some exotic zero-day. It walked through a legacy VPN

Carl B. Johnson Jun 01, 2021 6 min read
Cyber Security Definition

Cyber Security Definition: What It Actually Means in 2021

Colonial Pipeline Just Gave Us a Real-World Cyber Security Definition On May 7, 2021, a single compromised password shut down the largest fuel pipeline in the United States. Colonial Pipeline halted operations after a ransomware attack attributed to the DarkSide group, triggering fuel shortages across the Southeast. If you want

Carl B. Johnson May 18, 2021 6 min read
Security in Cloud Computing

Security in Cloud Computing: What Goes Wrong First

In April 2021, a misconfigured cloud storage bucket at a major Android app developer exposed the personal data of over 100 million users. Names, emails, passwords, chat messages — all sitting in plain view because someone forgot to toggle a single setting. This wasn't an exotic zero-day exploit. It

Carl B. Johnson May 13, 2021 6 min read