Tom Olzak
This channel provides weekly insights into information security and risk management topics.
I am a security researcher with over 38 years of IT and security experience. I contribute to blogs, write articles, and author books on risk management/security.
QUIC
How to Use theExploit Prediction Scoring System (EPSS)
White Collar Crime: Insider Threat Defense
CISA Zero-Trust Security Maturity Model Part 7: Cross-cutting Capabilities
CISA Zero-Trust Security Maturity Model Part 6: Applications & Workload Pillar
CISA Zero-Trust Security Maturity Model Part 5: Applications & Workload Pillar
CISA Zero-Trust Security Maturity Model Part 4: Network Pillar
CISA Zero-Trust Security Maturity Model Part 3: Device Pillar
CISA Zero-trust Maturity Model Part 2: The Identity Pillar
CISA Zero-Trust Security Maturity Model Part 1: Overview
The NIST 30 Principles of Trustworthy, Secure System Design
Securing Distributed Applications
Analysis of the Interplanetary File System (IPS)
Cloud Privileged Account Management
Ephemeral Certificates, Microservices, and Passwordless Authentication
Creating a Culture of Compliance
Managing the Human Attack Surface in Organizations
Verify Device Integrity
First-hop Redundancy
Secure Networks with EVPN-VXLAN
Cybersecurity Risk Analysis and Management Part 3
Cybersecurity Risk Analysis and Management: Part 1
Cybersecurity Risk Analysis and Management Part 2
Content Disarm and Reconstruction (CDR)
Visibility into TLS Traffic
Межсетевые экраны нового поколения с улучшенными возможностями искусственного интеллекта
Mobile Device Management
Инъекционные атаки
Windows Security Reference Monitor
API Security