Tag

Zero Trust

Understand the Zero Trust security model, which operates on the principle of never trust, always verify. Posts cover Zero Trust architecture, identity verification, micro-segmentation, least-privilege access, and practical steps for implementing Zero Trust frameworks across enterprise environments.

posts

Cybersecurity Terms Explained

Cybersecurity Terms Explained: A Practical Guide

During a breach investigation last year, I watched a CFO stare blankly at an incident responder who kept saying "the threat actor used credential stuffing to pivot laterally after compromising an MFA-gapped endpoint." The CFO's response: "Can someone please speak English?" That moment cost

Carl B. Johnson Jul 20, 2019 7 min read
IT Security

IT Security in 2026: What Actually Works Now

In February 2024, Change Healthcare — one of the largest health IT companies in the United States — suffered a ransomware attack that disrupted insurance claims processing for thousands of hospitals and pharmacies nationwide. UnitedHealth Group, its parent company, later disclosed that the breach affected roughly 100 million individuals. The root cause?

Carl B. Johnson Feb 22, 2019 7 min read
Cyber Security

Cyber Security in 2026: What Actually Stops Breaches

A Single Stolen Password Cost One Company $150 Million In 2024, Change Healthcare suffered a catastrophic breach that disrupted pharmacy operations across the United States for weeks. The entry point? A compromised credential on a system lacking multi-factor authentication. That single oversight in cyber security led to what UnitedHealth Group

Carl B. Johnson Feb 14, 2019 6 min read