Archive
-
AI
1
- Apr 8, 2025 Zines, Blogs, Bots: A Love Story
-
Cognitive Bias
10
- Jan 19, 2022 How a 14th-century English monk can improve your decision making
- Feb 27, 2021 Black Swans and risk blindness
- Aug 10, 2020 Probability & the words we use: why it matters
- Mar 21, 2020 No, COVID-19 is not a Black Swan event*
- Oct 4, 2019 Improve Your Estimations with the Equivalent Bet Test
- Aug 7, 2018 The Semi-Attached Figure: How to spot manipulative security advertising claims
- Jul 22, 2018 The Mad Men of Cyber Security Advertising
- Jan 4, 2018 Will the Real “Year of the Data Breach” Please Stand Up?
- Apr 17, 2017 The Birth of a Ransomware Urban Myth
- Mar 10, 2017 Selection Bias and Information Security Surveys
-
Decision Analysis
4
- May 9, 2021 Using Risk Assessment to Support Decision Making
- Nov 21, 2018 Bring Uncertainty Back
- Oct 23, 2018 How Many Lottery Tickets Should I Buy?
- May 6, 2018 GDPR, Ragnarok Online and Decision Analysis
-
Information Security
5
- Apr 22, 2025 Vendor Sales Tactics: The Good, The Bad, and the Bathroom
- Jan 18, 2022 A Beginner's Guide to Cyber War, Cyber Terrorism and Cyber Espionage
- May 12, 2015 What’s the difference between a vulnerability scan, penetration test and a risk analysis?
- Mar 17, 2015 Not all data breaches are created equal — do you know the difference?
- Feb 18, 2015 The Sony Pictures Entertainment hack: lessons for business leaders
-
Metrics
8
- Feb 2, 2022 The CISO’s White Whale: Measuring the Effectiveness of Security Awareness Training
- May 20, 2021 My 2020 Predictions, Graded
- Oct 13, 2020 Better Security Metrics with Biff Tannen
- Oct 7, 2020 Better Security Metrics with the Clairvoyant Test
- Feb 5, 2020 San Francisco's poop statistics: Are we measuring the wrong thing?
- Dec 7, 2019 My 2020 Cyber Predictions -- with Skin in the Game!
- Nov 26, 2019 The Most Basic Thanksgiving Turkey Recipe -- with Metrics!
- Oct 1, 2018 An Evening with Doug Hubbard: The Failure of Risk Management: Why it's *Still* Broken and How to Fix It
-
Quantitative Risk
19
- Oct 16, 2021 How to write good risk scenarios and statements
- Aug 16, 2021 Optimizing Risk Response, Unfiltered
- Aug 16, 2021 ISACA’s Risk Response Whitepaper Released
- Aug 3, 2021 SIRAcon 2021 Talk | Baby Steps: Easing your company into a quantitative cyber risk program
- Jul 21, 2021 The Elephant in the Risk Governance Room
- Jun 30, 2021 When the Experts Disagree in Risk Analysis
- May 9, 2021 The Sweet Spot of Risk Governance
- Apr 12, 2021 Risk modeling the vulnerability du jour, part 2: Forward-looking risk registers
- Mar 21, 2021 Risk modeling the vulnerability du jour, part 1: Framing
- Oct 20, 2020 Risk Mythbusters: We need actuarial tables to quantify cyber risk
- Jul 24, 2020 Recipe for passing the OpenFAIR exam
- Mar 19, 2020 Book Review | The Failure of Risk Management: Why It's Broken and How to Fix It, 2nd Edition
- Feb 11, 2020 Exploit Prediction Scoring System (EPSS): Good news for risk analysts
- Jul 21, 2019 Aggregating Expert Opinion: Simple Averaging Method in Excel
- Jul 12, 2019 Aggregating Expert Opinion in Risk Analysis: An Overview of Methods
- Dec 27, 2018 Should I buy mobile phone insurance? A Quantitative Risk Analysis
- Nov 22, 2018 Book Chapter: Cyber Risk Quantification of Financial Technology
- Mar 24, 2018 Black Swans in Risk: Myth, Reality and Bad Metaphors
- May 31, 2015 Prioritizing Patches: A Risk-Based Approach
- Security Economics 3
-
Statistics
2
- Feb 7, 2021 The 2021 Security Outcomes report and better research methods
- Feb 25, 2017 The Problem with Security Vendor Reports
- Vendors 1
Most people think risk only moves when you add controls, but five other hidden forces are quietly reshaping your exposure behind the scenes. This post breaks down the six levers that actually move the math, so you can stop treating risk like a snapshot and start reading it like a live feed.