top of page

Search
Notes from the field: Jetbrains, Trust, and software
Widely Used Software Company May Be Entry Point for Huge U.S. Hacking (Published 2021) ( https://www.nytimes.com/2021/01/06/us/politics/r...
Joel Van Dyk
May 11, 2022
Third Party Risk or How to get your vendor to do NIST
I’ve been coming across this with many 3rd party outsourced relationships. This is why there is so much risk in 3rd party relationships....
Joel Van Dyk
Oct 14, 2021
HSMs and why being compliant is not secure
Data from companies, governments, and people are becoming less contained. You can find data from each of these on public, private and...
Joel Van Dyk
Jul 29, 2021
Still scamming
We have such great tools to solve problems that befuddled us 20 years ago that we sometimes forget the basics. But, the basics, like...
Joel Van Dyk
Jul 1, 2021
Uncertainty, Measuring CyberSecurity and Heisenberg
“The Concept of Measurement As far as the propositions of mathematics refer to reality, they are not certain; and as far as they are...
Joel Van Dyk
May 26, 2021


The Cost of a Breach
Last week I posted on the accelerating frequency and size of breaches and their effect, or lack thereof, on CyberSecurity employment and...
Joel Van Dyk
May 13, 2021


Cyberpay, CyberBreaches, CyberRisk, Cyberskills shortage, and Economics
At the beginning of the month I found this very interesting report “2021 US Cybersecurity Salary & Employment Study”...
Joel Van Dyk
May 5, 2021
Reporting on Continuous Agile Application Security
In my previous article about Application Security we figured out how to make the process frictionless and integrate into the Agile CI/CD...
Joel Van Dyk
Feb 11, 2021


Continuous Agile Application Security
The main thing about doing application development security now is not only being able to fit into the Agile process, but to be able...
Joel M. Van Dyk, CISSP
Jan 20, 2021
CyberRisk, how long is a cm and why the speed of light = 1
I came across this question helping (ok forcing) my 7 yr old to do his homework. The question seems pretty innocent, it if you think a...
Joel Van Dyk
Nov 25, 2020
Why COVID-19 is like CyberSecurity Risk
As a parent these days, we discuss many things with our school. Often the discussion is about the pros and cons of allowing students and...
Joel Van Dyk
Nov 18, 2020
What Languages do I need to learn for CyberSecurity?
CyberSecurity, just like IT in general, is getting more software driven. Short of starting out as a developer, what should most...
Joel Van Dyk
Sep 11, 2020
How to create an Information Security Architecture Program
In a previous article in the blog I described the need for the information security architecture program. It begs the question: how do...
Joel Van Dyk
Jul 23, 2020
Information/CyberSecurity Architecture
I've spent a large part of my career in security doing security architecture. One of the pillars of a good information security program...
Joel Van Dyk
Jun 22, 2020
SSL at Work (Shadow IT)
Where SSL can help you protect your information personally, and at work, for Information Security, it can be a source of data leakage. ...
Joel Van Dyk
May 27, 2020
SSL for Home
Now that you are working from home, your kids are studying (hopefully) from home, and using your computer devices in odd places (that you...
Joel Van Dyk
May 27, 2020


RISK vs REWARD
The toughest thing in remediating risk is not finding the vulnerabilities or toting them up, and it's not even persuading the owners to...
Joel Van Dyk
May 4, 2020


COVID-19 and Parental Controls at home
As the tech Dad at my son’s school, I’ve volunteered to help with a lot of the glitches common in supporting computers which support our...
Joel Van Dyk
May 2, 2020


Joel Van Dyk and the Drive to be Right as seen in SYNC MAGAZINE
Thank you, Jeff Silver for this article - it was an honor to be featured in Sync Magazine.
Joel M. Van Dyk, CISSP
Apr 22, 2020
bottom of page