The Cybersecurity SMB Blog

▼
Sunday, July 6, 2025

CrowdStrike One Year Later: 3 Key Lessons Learned

›
  Well guess what people?   It has been a year since the CrowdStrike fiasco, and from what we know, it was the biggest Cybersecurity   fiasc...
Saturday, June 28, 2025

How To Get Precious Cyber Funding From The C-Suite: 4 Golden Tips

›
  As I have written about many times before, it is especially important for a business today to conduct a thorough Risk Assessment to see wh...
Sunday, June 22, 2025

It's Not Just About Controls: 3 Brand New Cyber Strategies You Can Deploy Quickly

›
  For as long as I have been a technical writer in the world of Cybersecurity, I have never been asked this one question:   “What is a contr...
Sunday, June 15, 2025

The 4 Hidden Risks Of Multi Region Cloud Architectures: How They Can Be Avoided

›
  Whenever you sign for a hosting account or even open a subscription with AWS or Microsoft Azure, the excitement comes in when you see all ...
Sunday, June 8, 2025

How Not To Use Synthetic Data In Generative AI

›
  As I have described in my previous blogs about Generative AI models, the fuel that keeps their engine running is data – and lots of it.   ...
Sunday, June 1, 2025

Breaking Down What Secure By Design Means For Generative AI

›
  Just this past Thursday, I gave a presentation to about 150 people (coworkers of mine) about Generative AI and Cybersecurity.   I touched ...
Monday, May 26, 2025

How Being Cyber Rigid Can Cost You Dearly

›
  In the world of Cybersecurity today, having a plan of action to not only put our security breaches but to have the ability to restore back...
›
Home
View web version

About Me

The SMB Cyber Blog
View my complete profile
Powered by Blogger.