#GeneralInfoSec

LBHustonlbhuston
2026-01-20

If security policies introduce excessive frictionโ€”such as constant, unnecessary authentication prompts or blocked access to legitimate toolsโ€”employees will find ways around them.

Read more ๐Ÿ‘‰ lttr.ai/AnSdo

LBHustonlbhuston
2025-11-20

This complete and dynamic inventory serves as the foundational data source for building effective network segmentation, crafting granular access control policies, and ensuring the Zero Trust architecture covers the entire digital estate

Read more ๐Ÿ‘‰ lttr.ai/AlN0g

LBHustonlbhuston
2025-11-05

This plan should start by defining the most critical assets and data to protectโ€”the โ€œprotect surface.โ€ From there, map transaction flows, architect a Zero Trust environment, and create dynamic security policies.

Read more ๐Ÿ‘‰ lttr.ai/AknTZ

LBHustonlbhuston
2025-11-05

"By proactively addressing these potential pitfalls, your organization can move beyond legacy security models and chart a confident course toward a future where trust is never assumed and every single access request is rigorously verified." lttr.ai/AknJI

LBHustonlbhuston
2025-10-27

Fortify Identity: Make strong, adaptive identity and access management the core of your security controls.

Read more ๐Ÿ‘‰ lttr.ai/AkS4e

LBHustonlbhuston
2025-10-21

Critical Zero Trust Implementation Blunders Companies Must Avoid Now
โ–ธ lttr.ai/AkDwY

LBHustonlbhuston
2025-03-11

Require service providers to have adequate business continuity and disaster recovery plans that align with the organizationโ€™s own resilience strategies.

Read more ๐Ÿ‘‰ lttr.ai/AcOwZ

LBHustonlbhuston
2025-02-15

Ensure you understand which security responsibilities are yours and which security responsibilities belong to the service provider.

Read more ๐Ÿ‘‰ lttr.ai/Aba3n

LBHustonlbhuston
2025-02-15

This is a new world since I first began in the information security business.

Read more ๐Ÿ‘‰ lttr.ai/Aba19

LBHustonlbhuston
2025-02-14

Here is some advice on IR communications that has proven beneficial to the organizations that we have worked with in the past

Read more ๐Ÿ‘‰ lttr.ai/AbYuE

LBHustonlbhuston
2025-01-25

In this blog I will outline this guidance as it applies to Information security training and awareness programs.

Read more ๐Ÿ‘‰ lttr.ai/AavUT

LBHustonlbhuston
2025-01-25

They are adept at creating policies and strategies customized to your organization's specific needs, ensuring a robust cybersecurity infrastructure.

Read more ๐Ÿ‘‰ lttr.ai/AavSx

LBHustonlbhuston
2025-01-23

They are already using voice cloning to convince people to reveal private information or to allow them access to private systems with great success.

Read more ๐Ÿ‘‰ lttr.ai/AarE9

LBHustonlbhuston
2024-12-28

As must be readily apparent, the final result is going to be a mountain of documentation that, despite its complexity, must be readily accessible and comprehensible to all that are governed by it.

Read more ๐Ÿ‘‰ lttr.ai/AZ4io

LBHustonlbhuston
2024-12-25

Their guidance on regulatory reporting decisions ensures you navigate complex requirements with confidence, balancing compliance obligations with your organization's best interests.

Read more ๐Ÿ‘‰ lttr.ai/AZz3I

LBHustonlbhuston
2024-12-20

When combined with encryption of sensitive data across your network and backups, these controls pose a formidable obstacle for attackers to overcome.

Read more ๐Ÿ‘‰ lttr.ai/AZr2u

LBHustonlbhuston
2024-12-04

The most comprehensive and current guidance on this subject can be found in the NIST special publication 800-161r1, Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations (C-SCRM).

Read more ๐Ÿ‘‰ lttr.ai/AZNAF

LBHustonlbhuston
2024-11-14

Zero-Trust Network Access: Strengthening Your Cybersecurity

Read more ๐Ÿ‘‰ lttr.ai/AYnSq

LBHustonlbhuston
2024-11-13

Ensure security settings are enabled and applied in cloud environments.

Read more ๐Ÿ‘‰ lttr.ai/AYkkD

LBHustonlbhuston
2024-11-12

I also recommend contacting similar organizations and user groups to see what advice they can give you from their own experiences with handling communications during an incident.

Read more ๐Ÿ‘‰ lttr.ai/AYjQD

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst