Tag

zero trust

Examines the zero trust security model, which eliminates implicit trust and continuously verifies every user, device, and connection. Articles cover zero trust architecture principles, micro-segmentation, identity verification, least-privilege access, and practical implementation roadmaps for organizations.

posts

insider threat indicators

Insider Threat Indicators: Spotting Danger Before Damage

In July 2020, a 17-year-old in Florida convinced a Twitter employee to hand over internal credentials. Within hours, the attacker hijacked accounts belonging to Barack Obama, Elon Musk, and Apple — tweeting a Bitcoin scam to millions. The breach didn't start with a sophisticated exploit or zero-day vulnerability. It

Carl B. Johnson Dec 12, 2020 7 min read
NIST Cybersecurity Framework

NIST Cybersecurity Framework: A Practical Guide for 2026

The Framework 87% of Organizations Reference — But Most Implement Poorly When Change Healthcare suffered its catastrophic ransomware attack in early 2024 — ultimately affecting an estimated 100 million individuals — the post-incident analysis pointed to failures that the NIST Cybersecurity Framework was specifically designed to prevent. Missing multi-factor authentication on a critical

Carl B. Johnson Sep 20, 2019 8 min read